1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fomenos
3 years ago
3

A new school is being built in the local school district. It will have three computer labs with 28 computers each. There will be

58 classrooms with 2 computers each that need to be on one sub-subnet. The office staff and administrators will need 7 computers. The guidance and attendance office will have 5 computers. The school has been given the address 223.145.75.0/24.
Complete the information required below.

Subnet Subnet Mask (/X) Subnet Address First Usable Host Last Usable Host Broadcast Address
1

2

3

4

5

6

7

8

9

10
Computers and Technology
1 answer:
pychu [463]3 years ago
7 0

Answer:

The table is formed as attached figure.

Explanation:

Subnets can use specific number of hosts so /25 can host 128 hosts, reducing by a factor of 2 leading to /30 as with only 4 hosts. Thus the subnets are alloted as indicated in the attached image.

You might be interested in
What are the elements of an autobiographical narrative similar to those of a short story?
sattari [20]
A. because the form is about stories from events in a writer's life
6 0
4 years ago
A service specialist from your company calls you from a customer's site. He is attempting to install an upgrade to the software,
IgorLugansk [536]

Answer:

kill 1000

Explanation:

3 0
3 years ago
1. Think about the various ways in which you have seen hackers portrayed in popular media over the past few years. Are they hero
Eva8 [605]
They are definitely not heroic characters, so you can rule that out. Definitely dangerous criminals. If you need me to help further I can. Is that a question or an essay?
3 0
4 years ago
If you want to refine your Google search results by date, which option should you use?
just olya [345]
Try using ctrl, shift, delete
7 0
4 years ago
What should you call a person who has permission to bypass the security of a computer to access it
Sav [38]

Answer:

Administrator

Explanation:

Such permission to bypass the security of a computer to access it is being given to only the administrator. No other user is allowed to have such privileges. And there is only one administrator in a team, and this is the standard as only then the security of a network of computers, and a particular computer can be ensured. And the correct answer to this question is certainly the Administrator.

7 0
3 years ago
Other questions:
  • Im trying to learn c# for unity does anyone know any good sources
    10·1 answer
  • What is another name for a central processing unit? Computer Integrated circuit Microprocessor Transistor
    9·2 answers
  • I have an LG phone. Since I just bought my phone, my bill to text message isn't paid yet. I texted a couple of things playfully
    5·2 answers
  • Choose all items that represent characteristics of an HTML element. used to include additional information in an attribute consi
    15·1 answer
  • What is the largest value that can be represented by 6 binary digits? .
    5·1 answer
  • Lol fortnite really going UwU and anime
    12·2 answers
  • How do you access the <br><br>internet in your school and at home?​
    11·1 answer
  • Which generation computer supported GUI operating system?​
    11·1 answer
  • What is the first phase of the project process?
    14·2 answers
  • _is the joining of two or more electrical conductors by mechanically twisting the conductors together or by using a special spli
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!