An IP subnetting design requires 200 subnets and 120 hosts/subnet for the largest subnets, and requires that a single mask be used throughout the one private IP network that will be used. The design also requires planning for 20 percent growth in the number of subnets and number of hosts/subnet in the largest subnet. Which of the following answers lists a private IP network and mask that, if chosen, would meet the requirements?a. 10.0.0.0/25b. 10.0.0.0/22c. 172.16.0.0/23d. 192.168.7.0/24

Answers

Answer 1

Answer:

b. 10.0.0.0/22

Explanation:

Variable length subnet masking is a concept in networking that helps minimize wasting of Ipv4 ( IP version 4) network addressing. It takes a networking address and splits it to variable length.

The question above requires 120 hosts and a future host update of 20%, which is 144 hosts and a subnet of the same address of 200 to 240 in update. The host octet of the network address is totally used, which gives 254 hosts, that is extract 110 hosts. This can be further subnetted.

The two bits from the third octet is used for subnetting to give over 240 subnet mask.


Related Questions

if you want to refine your google search by date, which option should you use?

Answers

Answer:

If you want to refine your Google search results by date, you should use Advanced search.

Explanation:

Answer:

Advanced Search.

Explanation:

Just go down to settings at the bottom of google and choose advanced search and fill in the boxes so your search comes up more specific.

Which of the following is not a networking equipment?

Answers

Answer:

[tex]\boxed{\sf (C) \ mouse}[/tex]

Explanation:

A networking equipment can share data along a computer network. A mouse is not a networking equipment.

________is a nickname for social media tools which allows users to contribute content easily and to easily connect to each other. Instant Messaging Web 2.0 Cognitive surplus QR codes

Answers

Answer:

Web 2.0

Explanation:

The term that is being defined here is known as Web 2.0. As mentioned in the question this term refers to any and all social platform websites that emphasize user-generated content, ease of use, participatory culture, and interoperability for end users. Some examples of Web 2.0 features would be social media sites like FB, blogs, wikis, video sharing sites, image sharing sites, etc.

The availability of the appropriate compiler guarantees that a program developed on one type of machine can be compiled on a different type of machine.A. TrueB. False

Answers

A true because for an example do you have a computer and you want and you got a new one and you just want to put everything that was on the computer on it you can just switch the data and then automatically it will go on the other computer.
hope this helps

Carlos is using the software development life cycle to create a new app. He has finished coding and is ready to see the output it produces. Which stage of the software development life cycle is Carlos ready for next? Coding Design Maintenance Testing

Answers

Answer:

Testing

Explanation:

From the question, we understand that Carlos just finished the coding of the app.

In software development life cycle, the coding phase is where Carlos is expected to make use of his choice of programming language to design the app;

This stage is an integral part of the implementation process and according to the question, the coding has been completed;

The next phase or stage after the implementation phase is testing.

Hence, Carlos is getting ready to test the app.

Answer:

Testing                                   I took the test I definetly testing <3

Which statement is true about teams?

Answers

Answer:

Which is true of jet streams

A The subtropical jet stream flows to the east while the polar jet stream flows to the west

B The subtropical jet stream lies between the westerlies and polar easterlies

C The polar jet stream is generally stronger than the subtropical jet stream

D The polar jet stream lies between the polar easterlies and trade winds

The subtropical jet stream lies between the westerlies and trade winds.

Jet stream is defined as "a narrow, variable band of very strong, predominantly westerly air currents encircling the globe several miles above the earth." Each hemisphere has 2 or 3 primary jet streams that follow their same basic courses.

Explanation:

A team is a more collaborative and joint organization of individuals that function to perform similar set of tasks. The team all members work in accords with each other and complete the tasks on time.

The team is formed by a like minded people and has all characteristics of cooperation, coordination and friendliness. Thus the option D is correct . A Teams is more productive than with fewer individuals.

Learn more about the true about teams.

brainly.com/question/12078417.

What does the statement mean “To take a photograph is to participate in another’s person’s mortality, vulnerability, and mutability?

Answers

Answer:

probuly to take a photograph of ur childhood

Explanation:

idk

Answer:

To take photograph is to participate in another’s person’s mortality, vulnerability, and mutability. That means when you take a picture of someone you are participating in their lives, it may be just a small fragment of that life, but it still is a life.

Explanation:

A user is unable to access websites and has reported connectivity issues with pop-ups on the screen. A technician removes malware, and then is able to ping the router and access the websites. Which of the following NEXT steps should the technician perform in troubleshooting this issue? (Choose two.)
A. Documents findings, actions, and outcomes.
B. Reboot the device to verify the fix.
C. Reconnect the device to the network.
D. Verify the settings in IPConfig.
E. Research the problem based on symptoms.
F. Run a virus scan.

Answers

Answer:

A. Document findings, actions, and outcomes.

F. Run a virus scan.

Explanation:

Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that infects PGP software and sits quietly inside Alice's computer. When Alice uses her private key to decrypt a message, the virus would wake up and make a note of it. The next time that Alice connects to the Internet, the virus would surreptitiously send the private key to Eve, thereby allowing her to decipher all subsequent messages sent to Alice. One way to better connect with this excerpt is to

Answers

Answer:

Tell about an experience with a computer virus.

Explanation:

Simon Singh's "The Code Book," tells the history of how cryptography came into being and the secret messaging world of encryption. Through the detailed narration and diving into the history of encryption, the author traces the evolution of such a process and reveals how it has had a huge impact on the world's policies.

In the given excerpt, Singh gives an example of how viruses are planted and used to spy/ get access to other people's computers. But while it is possible to get the main point of the example, it would have been better if the writer includes experience with a computer virus so that readers will find it easier to connect with the given example. This will enable them to better understand the working of viruses and their effects.

Thus, the correct answer is the first option.

Answer:

b

Explanation:

What are the parts to an
email?

A)Recipient, Greeting, Body, Closing
B)Recipient, Subject, Body, Signature
C)Recipient, Subject, Greeting, Body, Closing, Signature
D)None of the above

Answers

Answer:

B) recipient subject body signature

Does anyone know how I can fix this? I don’t know what is wrong. When I click retry it restarts my laptop and returns back to this. Please help!

Answers

Answer:

Software Program Reinstallation

Use the following steps to reinstall factory installed software programs:

Click Start (), All Programs, Recovery Manager, and then Recovery Manager again.

Figure : Recovery Manager

Recovery Manager main screen

Under I need help immediately, click Software Program Reinstallation.

On the Software Program Reinstallation welcome screen, click Next.

Look in the Factory installed programs list for the software program you want to reinstall.

If your software program is listed, select the title.

If the program you want to reinstall is not listed, select The program is not in the list, and then click Next. Follow the instructions to reinstall the program.

Figure : Select program to reinstall

Software Program Reinstallation window

Click Next.

If you are not prompted to uninstall the program before reinstalling it, continue to the next step.

If you are prompted to uninstall the program before reinstalling it, follow these steps.

Click Start (), and then Control Panel.

Under Programs, Uninstall a program.

The Uninstall or change a program window opens.

Figure : Uninstall or change a program

Uninstall or change a program screen

Select the program you want to remove.

Click Uninstall or Uninstall/Change at the top of the program list.

Read and respond to any messages that appear while the software is being removed from your computer.

Once the program is uninstalled, resume the reinstallation from the Recovery Manager program.

When the reinstallation is complete, select Yes, and then Finish to restart the computer.

What type of edge does UML use to denote interface implementation? Group of answer choices A dotted arrow from the interface to the class terminated with a triangular tip. A dotted arrow from the interface to the class terminated with an open arrow tip. A dotted arrow from the class to the interface terminated with an open arrow tip. A dotted arrow from the class to the interface terminated with a triangular tip.

Answers

Answer:

A. A dotted arrow from the class to the interface terminated with a triangular tip

Explanation:

The properly marked source document states: (C) Operation Panda will take place on 29 September. The new document states: (C) On 29 September, Operation Panda will commence. What concept is used to derivatively classify the statement in the new document?

Answers

Answer:

The answer is "Contained in"

Explanation:

Its term refers to the classified information of the extraction process, even though outlined in an authorized categorization instruction origin without extra explanation or review, and incorporates these data in a new document.

In this concept, the information appears in the extracted word-for-word, its definition of 'in' will apply, or if its data has been paraphrased or restated from the current text, that's why we can say that this concept derivatively classifies the statement in new documents.

Can someone please tell me how I can hack WiFi with a raspberry pi in Kali Linux do I need a wireless adapter for raspberry pi if so please tell me and me ASAP please thanks appreciate it

Answers

lol wym hack wifi? need more info lol

Well honestly i dont know how to. i personally don't own one but there is YT videos. Go on YT and look up network chuck. hehas what your looking for.

Which step is common to both creating a new document and saving a document?

clicking the File tab
clicking the New tab
clicking the Save As tab
clicking the Blank document icon

Answers

Answer: clicking the File tab

Explanation: The file tab refers to a multifunctional tab in most Microsoft products such as Microsoft Word, Microsoft Excel and so on. The tab is located on the ribbon and usually the first located on the upper left corner. The tab houses the file functions. Clicking on the file tab, users can create a new document by clicking the File tab, click new, then click bank document to create a new document. Also, to save a file either using the 'save' or 'save as' command, just locate the file tab, click on it and select either the save or save as option. The save as function allows users to save a copy of a document without making changes to the already saved copy.

Answer:

clicking the File tab

Explanation:

I just took it

Could Anyone help me with these two questions?

Answers

Answer:1st is b

2nd is d

Explanation:

what is the importance of personal computers in connecting to the internet ?
^please I need an answer, PLEASE ^​

Answers

Answer:

if you dont you wont be able to do school work or check your email

Explanation

Answer:

security because it very important when we use internet

You have an application that for legal reasons must be hosted in the United States when U.S. citizens access it. The application must be hosted in the European Union when citizens of the EU access it. For all other citizens of the world, the application must be hosted in Sydney. Which routing policy should you choose in order to achieve this

Answers

Question options:

A. Latency-based routing

B. Simple routing

C. Geolocation routing

D. Failover routing

Answer:

C. Geolocation routing

Explanation:

Geolocation routing is used in allocating resources for different traffic sources originating from different geographical locations. Consequently you are allocating a different resource to handle a different DNS query based on the location/origination of the DNS query. In the above example, you will need to for example to route all queries from any other place in the world that is not US or Europe to a load balancer for Sydney. Your application in their different locations using geolocation routing would have to be adapted and localized to the region so as to serve the audience there

50 POINTS!!!! What is HpseuHostLauncher, and can I disable it without any major impact on my laptop?

Answers

Answer:

????????

Explanation:

Complete the body of the format_name function. This function receives the first_name and last_name parameters and then returns a properly formatted string. Specifically: If both the last_name and the first_name parameters are supplied, the function should return like so:

Answers

Answer:

Here is the Python program:

def format_name(first_name, last_name):  #function definition of format_name that takes first_name and last_name as parameters

   if first_name != '' and last_name != '':  #checks if first_name and last_name both are not equal to " "

       return ("Name: " + last_name + ", " + first_name)  #returns first name and last_name in format: "Name: last_name, first_name"

   elif first_name != '' or last_name != '':  #checks if either of the first_name or last_name is not equal to " "

       return ("Name: " + last_name + first_name)  #returns first name and last_name in format: "Name: last_name" or "Name: first_name"

   else:  #if both names are blank

       return ''  #return ""

 

Explanation:

The working of the above function can be checked by using the following statements:

print(format_name("Ernest", "Hemingway"))  

print(format_name("Voltaire", ""))  

print(format_name("", "Madonna"))  

print(format_name("", ""))

The program has a function format_name which takes two strings i.e. the first_name and last_name as parameters and returns the formatted string.

The first if condition checks if both the first_name and last_name are blank. For example if first_name = "Ernest" and last_name= "Hemingway" this means both the first_name and last_name are not blank or empty. So If this condition evaluates to true then the following statement is returned:

return ("Name: " + last_name + ", " + first_name)

This returns the last_name string first followed by a comma in between and then first_name string in the last. For the above example the string is printed in the following format:

Name: Hemingway, Ernest    

The elif condition checks if either of the first_name or last_name is blank. For example if first_name = "Voltaire" and last_name= "" this means last_name is blank or empty. So if this condition evaluates to true then the following statement is returned:

return ("Name: " + last_name + first_name)  

This returns the last_name string. For the above example the string is printed in the following format:

Name: Voltaire          

IF none of the above condition is true and both the first_name and last_name are blank then the following statement is returned

return ''  

This will just print and blank space in output.

The program and its output is attached.            

Here is the first line of a method declaration with some parts missing. public ________ scoreAnswer (studentAnswer ) Fill in the blanks in the method declaration using the following information: If scoreAnswer returns nothing and studentAnswer is a Paragraph object.

Answers

Answer:

void

Explanation:

The code snippet illustrates an object oriented programming (OOP)

From the question, the method name is scoreAnswer and it is not expected to return anything.

In OOP, when a method is expected to return nothing, the method is declared as void.

So, the blank will be replaced with the keyword void and the full statement is

public void scoreAnswer(studentAnswer)

Design a program that gives simple math quizzes. The program should display two random numbers that are to be added, such as: 247 + 129 The program should allow the student to enter the answer. If the answer is correct, a message of congratulations should be displayed. If the answer is incorrect, a message showing the correct answer should be

Answers

Answer:

import random

num1 = random.randint(0, 1000)

num2 = random.randint(0, 1000)

print(str(num1) + " + " + str(num2) + " = ?")

result = int(input("Enter the answer: "))

if result == (num1 + num2):

   print("Congratulations!")

else:

   print("The correct answer is: " + str(num1 + num2))

Explanation:

*The code is in Python.

Import the random to be able to generate random numbers

Generate two numbers, num1 and num2, between 0 and 1000

Ask the sum of the num1 and num2

Get the input from the user

If the answer is correct, display a message of congratulations. Otherwise, display the correct answer

You play guitar and keep two files on your computer. One file, called strings, lists the different brands of strings you keep on hand. Another file, called music, lists the music books and scores you own. When you enter the command paste strings music, what happens

Answers

Answer is given below

Explanation:

when performing in computer and we have two files on the computer first one is string and another one is the music list                 so when we enter the command paste strings music than there will they display side by side on the screen.and on the left side of lists the string in screen and the right side is columns list the music book              

Which list method allows elements in a sequence to be removed and added at either end of the structure?
index
queue
stack
deque

Answers

Answer:

c.) stack

Explanation:

Answer:

the answer is c stack not only dose stack make the most since but i also got it right on edge 2020

Explanation:

You are generating a derivatively classified piece of information and are looking for information in a classified database. While you are searching, you find a piece of information that is extremely helpful. It appears to include all of the classification markings including portion, banner, and classification authority block. Is this information authorized for use as a source of derivative classification?

Answers

Answer:

Yes

Explanation:

A classified information is piece of information that is hidden from public eyes as it could threaten national security if exposed

A derivatively classified piece of information is a piece of information document that extracts information from a classified information source and incorporates this information into the document. These classified documents bear classification markings which are used to show that the information is classified and give instructions on handling and dissemination. A derivative classifier is one who develops classified information using authorized classified information sources

Section 1.4 of Executive Order 13526 lists categories of information eligible for classification

In a batch operating system, three jobs JOBI, JOB2, JOB3 are submitted for ex- ecution. Each job involves an I/O activity, a CPU time, and another 1/0 activity. JOB1 requires a total of 21 ms, with 3 ms CPC time. JOB2 requires 29 ms total time with 5 ms CPU time. JOB3 requires 14 ms total time with 4 is CPU time. 3.1 What will be the CPU utilisation for uniprogramming? Write down all interme diate steps. 3.2 What will be the CPU utilisation for multiprogramming? Write down all inter- mediate steps

Answers

Answer:

The answer to this question can be defined as follows:

In option 1, the answer is "18.75%".

In option 2, the answer is "33%".

Explanation:

Given:

JOB 1-Time of the CPU = 3ms, rest = 18ms, sum = 21  

JOB 2-Time of the CPU = 5ms, rest = 24ms, sum  = 29    

JOB 3 -Time of the CPU =4ms, rest = 10ms, sum = 14  

In option 1:

whenever the job has also been allocating the system, in the uni-programs system, which looks at the CPU until it is complete.  

Formula:

[tex]\text{Utilization of CPU} =\frac{ \text{total time of CPU} }{ \text{full real time}}[/tex]

                              [tex]=\frac{(3+5+4)}{(21+29+14)}[/tex]

                              [tex]=\frac{12}{64}\\\\= 0.1875\\\\=18.75%[/tex]

In option 2:

However, if any software is interested in other operations like I / o, it can assign to the CPU Processor to others Systems and other software may be carrying out I / o operations there while the processor is with any other application.

Formula:

[tex]\text{Utilization of CPU} =\frac{ \text{total time of CPU} }{ \text{full real time}}[/tex]

                              [tex]=\frac{12}{36}\\\\=\frac{1}{3}\\\\=.33\\\\= 33 \%[/tex]

You work in a customer call center. Martin is on the phone asking about the difference between solid-state drives (SSDs), hybrids, and magnetic hard drives for his laptop. He is going to use for web surfing, emailing, and creating documents. Which hard drive would provide the best performance and reliability

Answers

Answer:

the hybrids will be better

As the security administrator for your organization, you must be aware of all types of attacks that can occur and plan for them. Which type of attack uses more than one computer to attack the victim?

Answers

Answer:

The answer is "DDoS "

Explanation:

The distributed denial of service attack (DDoS) occurs whenever a directed program's wireless data or assets, generally one or even more application servers, were also swamped by various machines. This attack is always the consequence of many affected systems, that fill up the target network with traffic.

This attack is aimed to avoid legal customers of one's website from accessing it.  In being effective in a DDoS attack, further demands need to be sent to the hacker than even the victim's server could deal with.  One other way to successfully attack is to send fake requests from the attacker.

Different bosses have the authority to run their own departments in what department?

Answers

Answer:

Decentralized organization

Explanation:

A decentralized organization is an organization that decisions about the operation of the organizations units are made by the mid-level managers or lower-level managers as the case may be, instead from being made directly from the senior management or the company head

Fast-food franchise chain management is an example of a decentralized organization such that each outlet manages the planning income and expenditure of the unit business.

Decentralization is can be beneficial as it can lead to outstandingly broad creativity as demonstrated in  Google,which is  another good example of a decentralized structure of organizational management.

In 25 words or fewer, describe what Jaime could do at the guitar store to help customers satisfy their needs and wants.

Answers

Answer:

Jaime could allow the use of the guitars that are for sale within the store.

Explanation:

One of the biggest problems with these musical instrument stores is that you are not allowed to play the instruments unless you are going to buy them.

A store that allows the practice of these instruments within the establishment ensures that the customer tried to play the instrument, liked it, and decided to buy it.

It is a way to satisfy the customer.

Answer:

He could ask customers if they need help finding what they want. He can let his manager know if any product is running low.

Explanation:

legit the answer lol

Other Questions
What is an empirical formula? welcome to my home...bantu ya... An inductor is hooked up to an AC voltage source. The voltage source has EMF V0 and frequency f. The current amplitude in the inductor is I0.Part AWhat is the reactance XL of the inductor?Express your answer in terms of V0 and I0.Part BWhat is the inductance L of the inductor?Express your answer in terms of V0, f, and I0. During the year, Wright Company sells 500 remote-control airplanes for $110 each. The company has the following inventory purchase transactions for the year. Date Transaction Number of Units Unit Cost Total Cost Jan. 1 Beginning inventory 60 $66 $3,960 May. 5 Purchase 280 69 19,320 Nov. 3 Purchase 230 74 17,020 570 $40,300 Calculate ending inventory and cost of goods sold for the year, assuming the company uses FIFO. On Wednesday at camp, Samuel went for a hike at 6:30 A.M. The hike took 2 hours and 15 minutes. As soon as he got back from the hike, Samuel played volleyball for 1 hour. What time did Samuel finish playing volleyball? A perpetuity provides for continuous payments. The annual rate of payment at time t is { 1, 0 ______ examined adolescents struggling to discover their own ego identity while negotiating, learning, and understanding social interactions, as well as developing a sense of morality and right and wrong. . Con cual obra de misericordia te idntificas I Need Help Please :( 7(x+1)=21 solve for x The distance a bike travels varies directly as the amount of time the bike has been ridden. Angela is riding her bike. If she travels a distance of 60 miles in 2 hours, how far has Angela traveled in 7 hours? A university in your state recently added a new state-of-the-art student center on their campus. This student center has bowling alleys, fast-food restaurants, group study space, and the latest green technology. Not long after it was finished, almost every other university in your state proposed and began building a new student center, too. How can the theory of institutional isomorphism explain this phenomenon EXTRA POINTS If x = 2.5, 5x = ____. (Only input decimals such as 12.7 as the answer.) 1) To point the lens of a camera up or down is called:A) ArcB)DollyC)PanD)tilt help me plz I really need this thanks I will give a lot of points A spray irrigation system waters a section of a farmer's field. If the water shoots a distance of 85 feet, what is the area that is watered as the sprinkler rotates through an angle of 60 degrees? Use 3.14 for pi . Round your answer to the nearest square foot, and enter the number only. round your answer to the nearest hundredth. Find angle A=? Search the Internet to find out more about the different ways in which people greet and say good-bye to each other in French-speaking countries. Then, based on your research, write a short essay in English of about 100-150 words comparing and contrasting expressions of greeting and parting used in French-speaking countries and the United States. Remember to mention which greetings and leave-taking expressions are used in formal and informal situations. The central problem in product-oriented layout planning is? 1.What is the Independent Variable?5 pointsConnor and Miguel want to investigate if the type offertilizer changes the color of their hydrangea flowers.They select 10 hydrangea bushes and plant them in thesame yard with the same type of soil. Every bush gets 3cups of fertilizer, but each receiving a different brand.One bush gets no fertilizer. All bushes receive morningsunlight and no afternoon sunlight. All bushes are wateredthe same amount every other morning. After four weeks,the boys observe the color of the blooms on each bush.the bushthe soilthe fertilizerthe color of the plants