1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexxandr [17]
4 years ago
14

A firm is assigned the network part 133.44. It selects an 12-bit subnet part. Note that this is not on an octet (8-bit boundary)

. How many hosts are possible
Computers and Technology
1 answer:
Andreas93 [3]4 years ago
5 0

Answer:

Hello the options to your question are missing here are the options

a. 1022

b. 62

c .14

d. None of the above

Answer : None of the above ( d )

Explanation:

A firm is assigned the network part 133.44. It selects an 12-bit subnet part.  The number of  hosts  possible are

= 2^{12}   - 2

= 4094

Note : Subnetting is a technique that lets network administrators use the 32 bits available but  the actual host ID portion of the subnetted address is 12 bits in length.

You might be interested in
Which features you believe has improved in windows 8? And what do you believe has worsened in windows 8?
kkurt [141]
I believe the style and technology has improved since windows 8, but the speed has worsened.
7 0
3 years ago
. What is automated testing?
shepuryov [24]

Answer: Automated testing is testing of the software by the means of automation by using special tools .These software tools are responsible for the testing of the execution process , functioning and comparing the achieved result with actual result.

It is helps in achieving the accuracy as compared with manual testing and also also function without any human interruption.It produces the test scripts that can be re-used.

8 0
4 years ago
What are four things to keep in mind when spotting a job scam?
Tomtit [17]
In general
Fast money easily
At home
Pay a fee for the job
They ask for credit card or other payment methods they don't need access to
8 0
4 years ago
Read 2 more answers
Which Boolean operator limits information from the search parameters
solniwko [45]
The answer isC.Without
7 0
3 years ago
Bbbbbbbbbbbbbbbbbbbbbbbb
ira [324]

Answer:

ccccccccccccccccccccccccccccccccccccccccccccccc?

5 0
3 years ago
Read 2 more answers
Other questions:
  • What device did vladimir Zworykin use to develop television technology that resulted in the technology shifting from a mechanica
    13·1 answer
  • Which of the following illustrates an example of a Boolean data type?
    9·1 answer
  • Explain the differences between kernel applications of the OS and the applications installed by an organization or user.
    6·1 answer
  • Three broad categories of cryptographic algorithms are commonly used to create PRNGs: symmetric block ciphers, asymmetric cipher
    8·1 answer
  • Assume that scotus is a two-dimensional character array that stores the family names (last names) of the nine justices on the Su
    14·1 answer
  • A company has an Aruba solution. The company wants to host a guest login portal with this solution, and the login portal must gi
    7·1 answer
  • Fill in the blanks using A to J below.
    9·1 answer
  • Create a high-level plan to perform a gap analysis for Fullsoft Inc
    7·1 answer
  • How to make your nest learning thermostat stop doing something
    14·1 answer
  • Which original VPN protocol is supported by most platforms but offers low levels of security?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!