1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cloud [144]
3 years ago
12

Your location has been assigned the 172.149.254.0 /24 network. You are tasked with dividing the network into 13 subnets with the

maximum number of hosts possible on each subnet.
Required:
a. What is the dotted decimal value for the subnet mask?
b. How many additional bits will you need to mask in the subnet mask?
Computers and Technology
1 answer:
ira [324]3 years ago
4 0
  • The subnet mask would be a 32-bit integer which is formed by assigning the host bits to all 0's and the networking bits to so many 1's.
  • In this method, the subnetting separates the IP address between host and network addresses.
  • The subnet mask covers an IP address with its 32-bit number, thus the term "mask".

Given:

Network IP address \bold{= 172.149.254.0 /24}

Subnet numbers \bold{= 13}

Calculating the borrow bits:

\to  \bold{= ceil(\log_{2} 13) = 4 \ bits}

a)

Calculating the dotted decimal value for the subnet mask:

\to \bold{11111111.11111111.11111111.00000000}\\\\\to \bold{255.255.255.240}\\\\

b)

The additional bits which will be needed to mask the subnet mask that is = 4.

Learn more: brainly.com/question/2254014

You might be interested in
Nathan wants to use the Push transition from left to right in his presentation. After he selects the Push transition, what shoul
Vladimir [108]

After he selects the Push transition, He should select from Left option from the Effect Options drop-down menu.

<h3>What is push transition in PowerPoint?</h3>

The Push Transition Effect is known to be a function in a PowerPoint that helps to pushes one slide to show the other.

Note that when this is  applied to any presentation, it moves the current slide upwards to reveal the next slide and so on. A person can add use this kind of effect to present a scrolling effect to one's PowerPoint work.

Learn more about presentation from

brainly.com/question/24653274

8 0
2 years ago
Read 2 more answers
"________ are used to edit videos to enhance quality and appearance."
AveGali [126]
Video editors are used to edit videos making them more visually pleasing in quality and appearance. They are very popular nowadays when people are fond of taking videos and uploading them to social networking sites. Examples are Adobe Premier PRo, Sony Vegas Movie studio and Lightworks.
5 0
3 years ago
Which of the following sets of data would be represented best in histogram?
wariber [46]
I think it would be B. The average monthly sales for the big toy company because its giving data over history
7 0
3 years ago
Read 2 more answers
Which of the following best describes the infrastructure ISPs provide?
svet-max [94.6K]

Answer:

cables, towers, and underground tubes

Explanation:

Its certainly the above one, and through this internet service is being provided. So internet service is self-understood, and what ISP firstly provides are cables, underground tubes, and the towers. And it is only these all through which the ISP provides internet service. And remember we are in this question dealing with the infrastructure and not the services or products. Hence, phone service, websites, and files, as well as the emails, search engines, and the videos, are not the solution here as they are not the infrastructure. And ISPs never provide the computers, ethernet cables or keyboards.

Hence, the correct answer is as mentioned in the answer section.

4 0
3 years ago
A computer program is tested by 5 independent tests. If there is an error, these tests will discover it with probabilities 0.1,
Svetllana [295]

Answer:

0.8488

Explanation:

Let E =error found by test 1

Let F=error found by test 2

Let G=error found by test 3

Let H=error found by test 4

Let I= error found by test 5

Given P(E)=0.1, P(F)=0.2, P(G)=0.3, P (H)= 0.4, P (I)=0.5

therefore P(notE)=0.9, P(notF)=0.8, P(notG)=0.7, P(not H)=0.6, P (notI)=0.5

Tests are independent P(not E & not F &not G & not H & not I=P(notE)*P(notF)*P(notG)*P (notH)*P (not I) =0.9*0.8*0.7*0.6*0.5 =0.1512

P(found by at least one test)= 1- P(not found by any test)=1-P(not E& not F & not G & not H & not I ) = 1-0.1512 = 0.8488

5 0
3 years ago
Other questions:
  • Regulatory control limits the activities of an organization in compliance with the organization's policies. True False
    14·2 answers
  • Telecommunications is the transmission of voice and video as well as data and usually implies transmitting a longer distance tha
    5·1 answer
  • Write a function that iteratively appends random 1's and 0's to an array to form a binary number. The function returns the binar
    13·1 answer
  • Chandra, a student working on a group project, is trying to decide how to have the whole group suggest revisions for an essay. S
    10·1 answer
  • The two ways to use the help menu is by searching of the contents or searching the _____
    13·2 answers
  • Jimmy and his friends are creating a rock band and have decided to turn his garage into a recording studio. He wants to sell the
    9·2 answers
  • If you are inserting an address block with the Address Block dialog box and the fields do not connect automatically, what can yo
    6·2 answers
  • Jack lost all the data he saved on his desktop because of a power outage while working on a presentation. On which of these comp
    15·2 answers
  • Using a conversation voice is part of:
    9·1 answer
  • Give an example of an occasion when you used logic to solve a problem
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!