An IP subnetting design requires 200 subnets and 120 hosts/subnet for the largest subnets, and requires that a single mask be used throughout the one private IP network that will be used. The design also requires planning for 20 percent growth in the number of subnets and number of hosts/subnet in the largest subnet. Which of the following answers lists a private IP network and mask that, if chosen, would meet the requirements?a. 10.0.0.0/25b. 10.0.0.0/22c. 172.16.0.0/23d. 192.168.7.0/24

Answers

Answer 1

Answer:

b. 10.0.0.0/22

Explanation:

Variable length subnet masking is a concept in networking that helps minimize wasting of Ipv4 ( IP version 4) network addressing. It takes a networking address and splits it to variable length.

The question above requires 120 hosts and a future host update of 20%, which is 144 hosts and a subnet of the same address of 200 to 240 in update. The host octet of the network address is totally used, which gives 254 hosts, that is extract 110 hosts. This can be further subnetted.

The two bits from the third octet is used for subnetting to give over 240 subnet mask.


Related Questions

Hackers often raise the trust level of a phishing message by modeling the email to look similar to the internal email used by the target company. This includes using logos, formatting, and names of the target company. The phishing message will often use the name of the company CEO, President, or Managers. The time a hacker spends performing research to locate this information about a company is known as

Answers

Answer:

Reconnaissance

Explanation:

The attacker sent data that was able to manipulate the return address that is reserved to store expected data

Answers

Complete Question:

An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The attacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions?

Answer:

A buffer overflow.

Explanation:

In Computer science, a buffer can be defined as a temporary area set aside for data storage. Buffers reside in the random access memory (RAM).

In the event that, a system process or program places more data (much more than what was originally or initially intended to be allocated for data storage) in a buffer, the extra data overflows. Consequently, this would result in having some of the data to flow into other buffers and thus, causing the data to be overwritten or corruption of the data being held in that buffer.

For example, we can liken a buffer-overflow to pouring water (data) into a container (program memory), once it is filled the water begins to overflow as the container has reached its maximum amount.

In this scenario, the vulnerability exploit which resulted from the attacker's actions by manipulating the return address that is reserved to store an expected amount of data is referred to as a buffer overflow.

The marketing department has hired a new employee. Prior to the new employee's first day at work, you have set up and configured a new laptop computer. The computer and all of the peripherals were purchased from the same vendor. After the new employee begins work, you receive a phone call stating that the wireless mouse is not working.

Which of the following is the MOST likely reason the mouse isn't working?

A. The USB mouse driver is too old for the current mouse.
B. The USB mouse is not a wireless mouse and needs to be plugged into the computer.
C. The USB mouse is malfunctioning.
D. The USB mouse receiver is not plugged into the computer.

Answers

Answer:the usb mouse receiver is not plugged into the computer

Explanation:

In the case above, one can say that the USB mouse receiver is not plugged into the computer.

What is a USB mouse?

A USB mouse is known to be a tool that is often attaches to a computers USB port.

In the case above, one can say that the USB mouse receiver is not plugged into the computer and as such it cannot perform the task it need to do.

Learn more about USB mouse from

https://brainly.com/question/10847782

#SPJ9

please help me with this this is Computer chapter Advanced HTML of class 8th​

Answers

Answer:

ok let me try

It stands for

Hypertext Markup Language

Image result for html stands for

HTML (the Hypertext Markup Language) and CSS (Cascading Style Sheets) are two of the core technologies for building Web pages. HTML provides the structure of the page, CSS the (visual and aural) layout, for a variety of devices.

Which of the following is not a networking equipment?

Answers

Answer:

[tex]\boxed{\sf (C) \ mouse}[/tex]

Explanation:

A networking equipment can share data along a computer network. A mouse is not a networking equipment.

Universal containers uses a custom object named Insight, which is the child in a master-detail relationship with the opportunity object. Sales teams use this object to create requests for analysts who conduct supporting research regarding an opportunity. Sales teams use Salesforce1 mobile app and want to easily create new insight records from their phones. What should a consultant recommend to meet this requirement

Answers

Answer:

A. Create a custom object tab.

Explanation:

The custom object refers to an object in which a person creates to store the data and information i.e relevant for the business organization

While the custom object tab is a tab in which the data stored is displayed in the records of the custom object

Therefore according to the given situation,  since the sales teams used the mobile app and want to create new insight records by using their phones

So for meeting this we should recommend creating a custom object tab

Which of these is NOT an input device?
O keyboard
O mouse
O blinking light
O microphone

Answers

Blinking light is not one of the awansers

What are the advantages of Radio waves over micro waves?​

Answers

Answer:

radio frequencies can penetrate deeply into the material and thus heat thick products. They heat more slowly than microwaves and thus make it possible to treat more delicate products which require a slower heating.

what are the means of hardware security?​

Answers

Answer:

Hardware security is vulnerability protection that comes in the form of a physical device rather than software that is installed on the hardware of a computer system. ... Common examples include hardware firewalls and proxy servers.

Explanation:

Thank you

Explanation:

Hardware security is vulnerability protection that comes in the form of a physical device rather than software that is installed on the hardware of a computer system. ... Common examples include hardware firewalls and proxy servers.

The term platform as a service has generally meant a package of security services offered by a service provider that offloads much of the security responsibility from an enterprise to the security service provider. Select one: True False

Answers

Answer:false

Explanation:

write one function each of caps lock and shift keys.

Answers

Answer:you can use the shift key to use symbols instead of numbers on the top numbers part of the keyboard

Explanation:

Some Examples are ( ) $ &

convert (0.255)¹⁰ into binary

Answers

0.01000001010001111011

Must click thanks and mark brainliest

15 points please help!!!!


David works at a company that provides financial solutions. He wants to create an interactive presentation for his company. Which interactive platforms can David use for this presentation?

David can use an interactive or a for his presentation.

Answers

Answer:

Powerpoint presentation

Explanation:

Powerpoint presentation is a part of Microsoft office that is established by Microsoft. PowerPoint. It is used to present the company visions, missions, key points in a short and in an attractive way by using the various designs, pictures, audio clips, etc

Here David wants to create an interactive presentation so he should use the powerpoint presentations so that he could present the company visions, objectives, etc

what are the uses of mobile phones?​

Answers

Answer:

We use mobile phones to:

1. communicate with our friends and family

2. looking for the information/news in the world

3. looking for the material for study

and many others

may it helps^_^

Answer:

Mobile phones are used for a variety of purposes, such as keeping in touch with family members, for conducting business, and in order to have access to a telephone in the event of an emergency. Some people carry more than one mobile phone for different purposes, such as for business and personal use.

Explanation:

Plz mark me as brainiest

Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that infects PGP software and sits quietly inside Alice's computer. When Alice uses her private key to decrypt a message, the virus would wake up and make a note of it. The next time that Alice connects to the Internet, the virus would surreptitiously send the private key to Eve, thereby allowing her to decipher all subsequent messages sent to Alice. One way to better connect with this excerpt is to

Answers

Answer:

Tell about an experience with a computer virus.

Explanation:

Simon Singh's "The Code Book," tells the history of how cryptography came into being and the secret messaging world of encryption. Through the detailed narration and diving into the history of encryption, the author traces the evolution of such a process and reveals how it has had a huge impact on the world's policies.

In the given excerpt, Singh gives an example of how viruses are planted and used to spy/ get access to other people's computers. But while it is possible to get the main point of the example, it would have been better if the writer includes experience with a computer virus so that readers will find it easier to connect with the given example. This will enable them to better understand the working of viruses and their effects.

Thus, the correct answer is the first option.

Answer:

b

Explanation:

How the data is converted into the information?​

Answers

Answer:

the data is converted into information by data processing

Answer:

by data processing

Explanation:

data is converted to information by analyze or manipulate data by combining with other data and using experience

array Write a recursive function stringReverse that takes a string and a starting subscript as arguments, prints the string backward and returns nothing. The function should stop processing and return when the end of the string is encountered. Note that like an array, the square brackets ( [ ] ) operator can be used to iterate through the characters in a string.

Answers

user_in = str ( input ("Please enter a phrase: " ))

def reverse_str (string):

e = 0

for e in range (len (string)):

x = -1

print string[x]

x += (len (string))

Which of these are part of the CPU?
O peripheral
O HDMI cord
O core
O keyboard

Answers

Hiii I think the best option would be C. Core

an interface are connection point with hardware devices are joined​

Answers

Answer:

Explanation:

Networking hardware is the correct answer

Having a skilled labor force is one of the ________________ impacts of technology on the workplace.
negative
positive

Answers

The answer is positive

Answer:

negative

Explanation:

this is because not many people have the skills to operate the machines. In short not everyone is able to operate them

True or false we can used virus not use pirated software and programs ​

Answers

Answer:

False i guess

what do you mean by automation and diligence with respect to a computer??​

Answers

Answer:

Delegince computer without any motion resists

pls help help me is good help me helping is very good

Answers

Answer:

-56 negative

Explanation:

How do I make my mobile number appears switched off to a specific number not with truecaller app...(vivo user)​

Answers

Answer:

Hello, there is no way you can make your mobile number appear switched off to a particular number unless you really switch it off.

However, you can set your phone to "Call Forwarding" on your Android device. What it would do is that when the person calls your number, he gets the message that you are unreachable.

Explanation:

Here's how to set Call Forwarding on your android

Open your phone dialerGo to your Phone Settings Click on Call SettingsSelect Call Forwarding (in some Androids, you'll have to select 'Calling Accounts' first)Select 'Always Forward', 'When Busy', 'When Unanswered' or 'When Unreachable'After selecting your preferred option, you can set the forwarding numberEnable the settings or click 'Ok'

if your computer is gliching what do you do to stop it and some times it turnes off what do you do

Answers

Answer:

You can take it to the shop to fix it since it happens often ig

Explanation:

I Hope This Helps bro

A small group of travelers is meeting inside an ancient building, and the travelers need access to the Internet using their mobile devices. However, the group is in an area where Wi-Fi Internet is not available and cellular coverage is intermittent. One of the travelers has an unlimited cellular data plan and a strong consistent signal. Which of the following methods would most likely be implemented to provide Internet service to the group?a. Cell phone tetheringb. Satellite Internetc. Mobile hotspotd. Cell phone tethering

Answers

Answer:

c. Mobile hotspot

Explanation:

A mobile hotspot is a hotspot that is to be activated by turning on the WiFI hotspot. It is used to share the cellular data to the laptop, computer system and the mobile devices who do not have an internet connection

Since in the question, it is mentioned that the one traveler has an unlimited cellular data plan and a consistent strong signal

So the mobile hotspot should be used to provide internet service to the group.

You are an IT technician for a small computer store. You are designing a new gaming PC for a customer. You need to ensure that it provides the capabilities that will be needed by this type of PC. Which of the following should be a concern?

a. motherboard
b. CPU
c. graphics card
d. sound card

Answers

Answer:

all options

a, b and c the most important

Explanation:

Your company has decided to implement a wireless network. The wireless network users must be able to connect to resources on your internal network, including file, print, and DHCP services. Which options should you implement?

Answers

Options:

A Infrastructure mode

B Ad hoc mode

C a wireless access point

D static IP addresses

E APIPA

Answer:

A. Infrastructure mode

C. a wireless access point

Explanation: A DHCP is a server that makes use of s standard protocol called dynamic host configuration protocol to automatically assign internet protocol (IP) addresses and other computer parameters to clients. It gives them the opportunity to effectively make use of other network services such as DNS( domain name system) and NTP(network time protocol).

Felicity wants to capture the attention of the regular subway commuters in her area through her print advertisement. She wants to use a stationary print medium that commuters can see from a distance. Which print medium should Felicity choose?
(Correct answer only)

A. magazine
B. newspaper
C. flier
D. billboard
E. brochure

Answers

Answer:

D. billboard

Explanation:

Commuters can most likely see billboards from a distance.

The print medium to be chosen by the felicity should be Billboard. Thus, option (D) is correct.

What is billboard?

Billboard is a HORDING and huge outdoor advertisement board That can be seen by many people. In order to be seen by the most automobiles and pedestrians, billboards are frequently erected in busy places like highways and urban areas.

Many of the company publish their brands and products on the billboard for spreading brand awareness and spreading the word of their company  to as many people can know about the product.

According to the above scenario, Felicity can capture the attention of the regular subway commuters in her area through billboard advertisement. From a distance, commuters can see the advertisement.

Therefore, it can be print medium to be chosen by the felicity should be Billboard. Hence, option (D) is correct.

Learn more about Billboard here:

https://brainly.com/question/8494411

#SPJ2

what are the disadvantageous of emails

Answers

Answer:

it could lead to overload of information.. wastage information.it can cause misunderstanding and disabilities between both person.

Need internet connection.without it can't use.

it can be hacked.and also lack the personal touch..

Answer:

they can cause misunderstandings and people read with diffrent

moods

Explanation:

Other Questions
Before making a left or right turn, you should signal for at leastA: 100 feet.B: 300 feet.C: 400 feet. Read the selection and the question, and choose the option that best answers the question. Hola! Mi nombre es Marina y vivo en Colombia. Tengo 15 aos y estoy en la escuela superior. En Colombia, la escuela superior tiene cuatro rutas diferentes: Los programas tcnicos (12 aos) Los programas tecnolgicos (3 aos) Los programas docentes (45 aos) Los programas profesionales (45 aos) Yo estudio en el programa tcnico. Me encantan los animales y me gusta la comida saludable como las frutas y verduras. Cuando terminas los dos aos del programa tcnico, puedes comenzar a trabajar inmediatamente. Hace dos aos que mi amigo Sal estudia una carrera en el programa tcnico tambin. l estudia cmo medir las calles y avenidas cuando quieren construir o poner nuevas carreteras. Puede empezar a trabajar en un mes. Mi amiga Saida estudia en un programa docente para ser maestra. En las carreras profesionales necesitas estudiar ms que en las carreras tcnicas. Mi prima Anastasia estudia las computadoras en el curso tecnolgico. A ella le encanta la tecnologa. Based on the information from the text, who will take longer to complete his/her studies? 1) Anastasia 2) Marina 3) Saida 4) Sal write an introduction to the topic not that all glitters is gold Which nation did Iroquois confederancy side with and why? Schwartzkopf Co. purchased for $2,088,000 property that included both land and a building to be used in operations. The seller's book value was $294,000 for the land and $986,000 for the building. By appraisal, the fair value was estimated to be $826,355 for the land and $2,023,145 for the building. At what amount should Schwartzkopf report the land and the building at the end of the year? ABC is an equilateral triangle, solve y A point is randomly chosen on a map of North America. Describe the probability of the point being in each location: North America: New York City: Europe: Motor vehicles move, use energy and produce carbon dioxide and water. similar characteristics occur in living organisms yet motor vehicles are not classified as living. list the other characteristics of living that do not occur in motor vehicles what is liquid pressure? and tell me its si unit please What kind of government does North Korea have? Which best explains why the Declaration of Sentiments was used as a foundation for the suffrage movement? The Declaration of Sentiments called for women to have voting rights as full US citizens. The Declaration of Sentiments demanded that women attain equality in the workplace. The Declaration of Sentiments declared that women should be admitted to the same schools as men. The Declaration of Sentiments requested that women be freed of unjust property laws. Which part of economic theory is used to determine income and employment level of the economy ?(a) Microecnomics (b) Macroeconomics(c) Neither (a)nor(b) (d) Both (a) and (b) find the solutions to the equation-3y(2y+5)=0 Moe has entered into a contract with Larry. Subsequently, Moe assigns his rights in that contract to Curly. Which of the following would not prevent that assignment? Multiple Choice The assignment would violate public policy matters. The contract contains an anti-assignment clause. Larry protests the assignment and demands that Moe not make the assignment. The assignment would materially alter Larry's duties and cause an increased burden or risk to Larry. do we really have freedom of expression essay on it?plz reply asap? The odds in favor of a horse winning a race are 7:4. Find the probability that the horse will win the race. Why are viruses considered to be nonliving?A. They have no genetic material.B. They cannot reproduce without a host cell.C. They do not respond to their environment.'D. They cannot use energy. Determine if the event described is independent or dependent. Two people are standing in line at a movie theater trying to decide on which movies to see. a independent b dependent c neither d both prove that the line x-y=0 bisect the line segment joining the point (1,6) and (4, -1) Sabita is a mother in Nepal. She lives in poverty in the Western part of the country with her two children. Everyone in her family has some degree of malnutrition or nutrient deficiency. Match each of the following deficiency diseases with its corresponding nutrient.a. Sabita is blind from a diet devoid of fortified milk, animal products, or dark yellow and orange fruits and vegetables.b. Sabita has an enlarged thyroid gland due to a dependence on unfortified salt.Nutrient:1. Iron2. Vitamin A3. Vitamin D4. Iodine