1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xxMikexx [17]
4 years ago
9

Course hero 21. say you have a /15 network address. you are asked to create subnets with at least 1,000 hosts/ subnet. what is t

he maximum number of such subnets you can create? 128
Computers and Technology
1 answer:
Sladkaya [172]4 years ago
8 0
15 length of network ID, 2^10=1024, so 10 bits is the length of host ID and subnet ID is 7 bits since 32-15-10= 7, so 2^7=128 
You might be interested in
Which of these features will future games incorporate?
omeli [17]
Tactical ai and lighting
6 0
3 years ago
Read 2 more answers
CodeHS 3.4.5. What is the code for four colored triangles.
Delicious77 [7]

Answer:

I thinks its CodeHS 3.4.5.

Explanation:

5 0
4 years ago
What considerations have to be kept in mind with JPEG
topjm [15]
JPEG is a file format for an image that will be compressed. Since it compressed the file size will be much smaller. That makes JPEG is one of the most used file types for images and was a default format for many application. But the drawback of compressing an image is that a portion of the data will lose and will cause the image quality dropped or produce a noise.
8 0
4 years ago
If you want to retrieve a single record quickly in a database, what should you do?
Ksenya-84 [330]
It depends on your database system, but most of the database system, you had to do the indexes for it and then conduct a query by ID or something else.
8 0
4 years ago
Read 2 more answers
A majority of the people whose information was compromised are homeless; therefore there is no easy way to contact them in order
Novosadov [1.4K]

Incomplete question. Here's the full question:

Data-Time Inc. is a company that manages databases for a large city in Colorado. Included in these databases is information collected from the city’s homeless shelters and free clinics. Specifically, the databases contain personal information of the users of these services over the past 10 years; this includes people’s Social Security numbers and health records.

This data is highly secure and only accessible to the employees of Data-Time Inc. Employees are given a laptop when they are hired which allows them to access the database remotely. Unfortunately, one of these laptops is stolen and the security of the database is compromised.

A majority of the people whose information was compromised are homeless; therefore there is no easy way to contact them in order to alert them of the security breach. How should Data-Time Inc. manage this breach in security?

<u>Explanation:</u>

Since the emphasis is not on reversing the breach that has occurred, but on managing the level of security damage that could occur, it is important measures are directed towards preventing unauthorized access to sensitive information.

For example, the Media Access Control Address (MAC address) of the laptop if known could be greylisted from accessing the server that contains the sensitive information.

3 0
3 years ago
Other questions:
  • He primary purpose for attackers to send port scanning probes to hosts is to identify which ports are open. true false
    5·1 answer
  • Which file type is used for animated images?
    9·1 answer
  • Which would be the best reason to consider using plain tables instead of shaded tables in a document?
    6·2 answers
  • Telepresence provides the opportunity for people to work from home and attend virtually. True False
    5·2 answers
  • Explain why you should research a potential employer before actively seeking employment
    12·1 answer
  • Which line of code will print I can code on the screen?
    13·1 answer
  • Which of the following information would best be displayed throughout the use of a time line
    11·1 answer
  • How do you view a presentation as your audience would see it?
    14·2 answers
  • Write a for loop that prints the values 1 2 4 8 16 32 64 by increasing the value of a counting variable by a factor of two in ea
    15·1 answer
  • Comparing tools made of stone, iron, and bronze: place them in the correct order from least to most durable.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!