1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
larisa [96]
3 years ago
13

What are the assignable addresses for the 12th subnet with the network address of 220.100.100.0 and the number of needed subnets

is 45? a. 220.100.100.42 to 220.100.100.51 b. 220.100.100.52 to 220.100.100.55 c. 220.100.100.45 to 220.100.100.46 d. 220.100.100.40 to 220.100.100
Computers and Technology
1 answer:
bogdanovich [222]3 years ago
5 0

Answer:

C. 220.100.100.45 to 220.100.100.46

Explanation:

The Classless IP subnetting of 220.100.100.0 begins from the fourth octet of the IP address. To get 45 subnet mask, it uses 6 bits from the fourth octet, which approximately give 64 subnets, while the remaining 2 bits are used for host IP addressing.

The useable host IP addresses are gotten from the formula '2^{n}-2', with n=2 bits.

useable host IP addresses = 2^2 - 2 = 2 addresses per subnet.

While the 12th subnet is 12 x 2^2 = 44.

This means that the 12th subnet mask starts with 220.100.100.44 (as the network address) and ends with 220.100.100.47 as broadcast IP address, while '.45' and '.46' are the assignable addresses of the subnet.

You might be interested in
69.147.76.15 is an example of what?​
Rudiy27

Answer:

IP address.

Explanation:

An IP address is an acronym for internet protocol address and it can be defined as a unique number assigned to a computer or other network devices, so as to differentiate each device from one another in an active network system. Thus, an IP address is typically used to uniquely identify each computer or network devices connected to the internet or network.

Hence, 69.147.76.15 is an example of an IP address.

In Computer networking, IP address are classified into two (2) main categories and these are;

1. Local (internal) IP address.

2. Global (external) IP address.

Generally, when this IP address such as 69.147.76.15 is translated by a domain name system (DNS), it is mapped to the domain name yahoo.com which is much more understandable or comprehensible to the end users.

5 0
3 years ago
What are the design concepts and assumptions behind a class, an object and the relationship between them? What are the roles met
Triss [41]

Answer:

Object-oriented programming (OOP) is a procedural language and based on classes associated with an object. Without classes and object relationship OOP is not possible. According to program's design concept classes provide abstraction and encapsulation with the help of object. Object have states and behaviors like cat has states like name, color and  cat has also behaviors like  wagging the tail, eating, jumping etc. A class forms template or blueprints for these states and behaviors because different cats have different behaviors and states.

Methods provide a way for encapsulation and accessing private class members with public methods and static fields are sometimes best alternative for global variable. We can use static field when it same for all and shared by all objects of that class and it can save memory because we do not have to initialize it for each object

8 0
3 years ago
Social engineering attacks can be carried out:______.
Alik [6]
The answer most likely B NOT SURE )
3 0
3 years ago
Explain in detail, how the Depth Wavelet Transform (DWT) algorithm works, specifically with respect to EEGs (a non-invasive brai
andreyandreev [35.5K]

Electroencephalography-(EEG-) based control is a noninvasive technique which employs brain signals to control electrical devices/circuits.

This should help you

3 0
2 years ago
How to create a hacking program on java?
Paraphin [41]

Well I wouldn't get into stuff like that BUT if you really want to know you can make code to crash computers by over running the CPU. I'm not going to put it in this comment because I don't want you to do it as it can get you into trouble! You can also make a RAT( Remote access tool ), PLEASE DONT DO ANY OF THIS. You can also make programs in java to steal passwords off of chrome Firefox and other browsers and send them over FTP to you. As saying again please don't do any of this as getting into stuff like this is... not the best(that's why i'm not providing code!)

6 0
4 years ago
Read 2 more answers
Other questions:
  • 1. Why isn't solar energy usually the only power source for a region?
    10·2 answers
  • Two-dimensional array indexes are listed as
    8·1 answer
  • answer for brainliest Today, trending current events are often present on websites. Which of the following early developments in
    15·1 answer
  • Which of the following does Moore's law predict?
    15·1 answer
  • What does a code of conduct include?
    10·1 answer
  • What is the purpose of the GETPIVOTDATA function?
    13·2 answers
  • Haya would like to complemely delete Slide 11 from her presentation so that slides 12–16 become slides 11-15. What is
    9·1 answer
  • Write a method named collapse that accepts an array of integers as a parameter and returns a new array where each pair of intege
    6·1 answer
  • Which best describes sorting, filtering, and deleting records?
    6·1 answer
  • How can I master the computer organization ​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!