1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
larisa [96]
3 years ago
13

What are the assignable addresses for the 12th subnet with the network address of 220.100.100.0 and the number of needed subnets

is 45? a. 220.100.100.42 to 220.100.100.51 b. 220.100.100.52 to 220.100.100.55 c. 220.100.100.45 to 220.100.100.46 d. 220.100.100.40 to 220.100.100
Computers and Technology
1 answer:
bogdanovich [222]3 years ago
5 0

Answer:

C. 220.100.100.45 to 220.100.100.46

Explanation:

The Classless IP subnetting of 220.100.100.0 begins from the fourth octet of the IP address. To get 45 subnet mask, it uses 6 bits from the fourth octet, which approximately give 64 subnets, while the remaining 2 bits are used for host IP addressing.

The useable host IP addresses are gotten from the formula '2^{n}-2', with n=2 bits.

useable host IP addresses = 2^2 - 2 = 2 addresses per subnet.

While the 12th subnet is 12 x 2^2 = 44.

This means that the 12th subnet mask starts with 220.100.100.44 (as the network address) and ends with 220.100.100.47 as broadcast IP address, while '.45' and '.46' are the assignable addresses of the subnet.

You might be interested in
What is the difference between images and pictures
julia-pushkina [17]
An image is a representation of a person or thing but a picture is a painting or drawing
6 0
3 years ago
Which statement opens a file in such a way that information will only be written to its end?
Elenna [48]
OutputFile = open( "/path/to/file", "wa" ) # DOS probably needs 'b' too
3 0
3 years ago
Using the following table as your starting point for each algorithm SJN Given the following information: Job: A B C D E Arrival
victus00 [196]

Answer:

Please check the attachment,

The average turnaround time is 4.8 and average waiting time is 1.

Please note: Exit time is same as completion time.

Explanation:

Please check the attachment.

7 0
3 years ago
What types of company functions are aided by ERP?
Jet001 [13]

Answer:

These activities include <u>accounting, project management, attendance management, managing merchant details, attendance management, compliance and employee management.</u>

7 0
2 years ago
Suppose there are 2 routers in sequence between Host A and Host B, all of which use store-and-forward routing. What is the total
lora16 [44]

Answer:

Check the explanation

Explanation:

Going by the question above,there are 2 routers in a sequence amid Host A and Host B and using store-and-forward routing.

So that time would conprise of both propagation delay and transmission time

Propagation delay is nothing but the time taken for traveling.

Transmission delay is the amount of delay time from the beginning to end of transmission)

Now,

Propagation delay = distance traveled / speed of propagation

= 161200 / 2.7 *108 = 59703703.70 * 10-8 mili sec

Transmission delay:

= packet size / bandwidth

= 4 / (9.1 * 1024) = 4.2925 * 10-1 mili sec

Let us assume routers have zero (0) processing time

total time = Transmission delay by host A + Transmssion delay by router1 + Transmssion delay by router2 + propagation time

= 3 * ( 4.2925 * 10-1 ) + (59703703.70 * 10-8)

= 1.28775 + 0.5970370370 ms

= 1.884787 ms

6 0
3 years ago
Other questions:
  • What cell address indicates the intersection of the first row and the first column in a worksheet?
    15·2 answers
  • Which of the following typically have the highest auto insurance premiums?
    14·1 answer
  • What is ODBC? How is it related to SQL/CLI? 10.2. What is JDBC? Is it an example of embedded SQL or of using function calls? 10.
    8·1 answer
  • A graph of an organization'snet income over the past 10 years is an example of an analogmodel.
    7·1 answer
  • Jeremy is designing a website for a florist. He intends to discuss the web design with his client. Which tool should Jeremy use
    6·1 answer
  • Simone frequently downloads mobile apps from Amazon Appstore. What operating system does she have on her smartphone?
    6·1 answer
  • Write a C function which takes three parameters which are the cost for an item in a grocery store, the quantity to buy, and the
    12·2 answers
  • The computer that can be used for performing the daily life tasks that might include emailing, browsing, media sharing, entertai
    11·1 answer
  • Which program will have the output shown below?
    11·2 answers
  • Technical safeguards involve the hardware and software components of an information system. group of answer choices true false
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!