1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
larisa [96]
3 years ago
13

What are the assignable addresses for the 12th subnet with the network address of 220.100.100.0 and the number of needed subnets

is 45? a. 220.100.100.42 to 220.100.100.51 b. 220.100.100.52 to 220.100.100.55 c. 220.100.100.45 to 220.100.100.46 d. 220.100.100.40 to 220.100.100
Computers and Technology
1 answer:
bogdanovich [222]3 years ago
5 0

Answer:

C. 220.100.100.45 to 220.100.100.46

Explanation:

The Classless IP subnetting of 220.100.100.0 begins from the fourth octet of the IP address. To get 45 subnet mask, it uses 6 bits from the fourth octet, which approximately give 64 subnets, while the remaining 2 bits are used for host IP addressing.

The useable host IP addresses are gotten from the formula '2^{n}-2', with n=2 bits.

useable host IP addresses = 2^2 - 2 = 2 addresses per subnet.

While the 12th subnet is 12 x 2^2 = 44.

This means that the 12th subnet mask starts with 220.100.100.44 (as the network address) and ends with 220.100.100.47 as broadcast IP address, while '.45' and '.46' are the assignable addresses of the subnet.

You might be interested in
if we try to use tail-recursive rules to implement non-tail-recursive rules, it will normally result in rules that are
Agata [3.3K]

It will normally result in rules that are more complex and more difficult to understand option (C) is correct.

<h3>What is tail recursion?</h3>

The recursive function is essentially used as the function's final statement in the tail recursion.

If we try to use tail-recursive rules to implement non-tail-recursive rules, it will normally result in rules that are

A. simpler and easier to understand.

B. circular rules.

C. more complex and more difficult to understand.

D. more time-consuming in execution.

The recursive function is essentially used as the function's final statement in the tail recursion. Therefore, tail recursion is what happens when nothing remains to be done after returning from the recursive function.

Thus, if we try to use tail-recursive rules to implement non-tail-recursive rules, it will normally result in rules that are more complex and more difficult to understand option (C) is correct.

Learn more about the tail recursion here

brainly.com/question/20749341

#SPJ4

4 0
1 year ago
Wordwrap forces you to stop typing words and press the enter key at the end of each line.
kakasveta [241]
No. You can just keep typing and the words will wrap to the next line[s].
8 0
3 years ago
. One of the vulnerabilities the Morris worm used was a networking service called finger. The purpose of the finger service is t
Komok [63]

Answer: C)report the status of individual computer users

Explanation:Morris worm is known as the program that replicates itself automatically and hides in the computer system.Because of the vulnerability of the system ,the worm worked as finger protocol for the gaining of the user information and status.

Other option are incorrect as the they are not the vulnerability factor for the Morris worm to work on it and thus finger protocols don't work on those option.Thus, the correct answer is option(c)

3 0
3 years ago
Another one please help quick i got to go soon
astraxan [27]

Answer:

no

Explanation:

yellow: the last sentence in the text

blue: Queenies flowers reached for the sky

Personification means that you apply human characteristics to things that are not alive, like a flower smiling, a term used when people see a field of healthy flowers

7 0
3 years ago
While the Internet can be a great resource, the information is not always reliable, as anyone can post information. Select one:
Olin [163]

Answer: True

Explanation: Because anyone can post something and it can be non reliable

7 0
3 years ago
Other questions:
  • From the video "Your Password Sucks", using computer power to guess your password by trying multiple variations one after the ot
    15·2 answers
  • A function operates on this, which may consist of a constant, a cell reference, or another function.
    7·1 answer
  • Respecting culture in the workplace means understanding that
    5·2 answers
  • What is the leading use of computers
    15·2 answers
  • . Two or more functions may have the same name, as long as their _________ are different.
    9·1 answer
  • describe a real-world scenario where data is collected and needs to be both accurate and precise for the safety of the community
    9·1 answer
  • What does it mean to catch an exception?
    8·1 answer
  • Which of these are tools used to diagnose and test code? Check all of the boxes that apply.
    9·1 answer
  • A photographer stores digital photographs on her computer. In this case the photographs are considered the data. Each photograph
    6·1 answer
  • What is MVC architecture in relation to developing in web applications? How
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!