answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shepuryov [24]
2 years ago
10

Consider an ISP that owns the block of addresses in 123.119.14.64/26. Suppose it wants to create three subnets, where Subnet1 su

pports at least 30 interfaces, Subnet2 supports at least 12 interfaces, and Subnet3 supports at least 9 interfaces. Provide the network addresses (of the form a.b.c.d/x) of the three subnets that satisfy these requirements.
Computers and Technology
1 answer:
Fynjy0 [20]2 years ago
5 0

Answer:

123.119.14.64/27   - subnet1

123.119.14.96/28   - subnet2

123.119.13.128/28 - subnet 3

Explanation:

123.119.14.64/26   in binary

10000000.01110111.001110.01000000/26

2^6 = 64 addresses in total; therefore we can only assign 64 addresses from this block of IP

From the question we are told that

Subnet1 supports at least 30 interfaces,

Subnet2 supports at least 12 interfaces, and

Subnet3 supports at least 9 interfaces

Subnet 1 with 30 interfaces , this means we are going to turn on 5 bits from the host bits in the IP address (starting from the right) , In doing so we will have

10000000.01110111.001110.01000000/27

123.119.14.64/27  is the nework address 0f the first subnet

Secondly we add a 1 bit (because of the broadcast address) to the first network address;

This Subnet2 supports at least 12 interfaces,

10000000.01110111.001110.01000000/27   (from the first network)

similarly  we have

10000000.01110111.001110.01100000/28

Subnet3 supports at least 9 interfaces

Adding 1 bit to the second network ; we have that

10000000.01110111.001110.10000000/28,

You might be interested in
Susie works for an architectural firm and the partners have always drawn the plans for projects by hand. Though Susie learned ho
lidiya [134]

Answer:

The correct answer to the following question will be CAD.

Explanation:

CAD - It stands for Computer-aided Design. CAD is a software used for creating some 3D designs, creative drawing or some technical illustrations and is basically used by the engineers and artists.

Many projects based on electronic can be designed with the help of this software, electronic parts like circuit boards, etc.

Various types of CAD are as follows :

  • 2D (Two dimensional)
  • 3D (Three dimensional)
  • 3D wire frame
  • Solid modeling

This enables efficiency in design's quality, also increase in engineer and artist's productivity. So, many of the computer programs should recommend the Computer-aided design software to there project partners for some 3D and effective look on their project.

3 0
2 years ago
In a fantasy world, your character must face hordes of demons. Each demon is vulnerable to a type of magical spell. This weaknes
Y_Kistochka [10]

I think it's imperfect information.

7 0
2 years ago
Read 2 more answers
Which of these statements regarding mobile games is true? A. They are typically played indoors. B. They have detailed environmen
Lyrx [107]

Answer:

c and d

Explanation:

6 0
2 years ago
An encryption system works by shifting the binary value for a letter one place to the left. "A" then becomes: 1 1 0 0 0 0 1 0 Th
Vika [28.1K]

Answer:

The hexadecimal equivalent of the encrypted A is C2

Explanation:

Given

Encrypted binary digit of A = 11000010

Required

Hexadecimal equivalent of the encrypted binary digit.

We start by grouping 11000010 in 4 bits

This is as follows;

1100 0010

The we write down the hexadecimal equivalent of each groupings

1100 is equivalent to 12 in hexadecimal

So, 1100 = 12 = C

0010 is represented by 2 in hexadecimal

So, 0010 = 2

Writing this result together; this gives

1100 0010 = C2

Going through the conversion process;

A is first converted to binary digits by shifting a point to the left

A => 11000010

11000010 is then converted to hexadecimal

11000010 = C2

Conclusively, the hexadecimal equivalent of the encrypted A is C2

8 0
2 years ago
A summer camp offers a morning session and an afternoon session.
defon

Answer:

(A) IF (IsFound

(afternoonList, child))

{

APPEND (lunchList, child)

}

Hope this helps!

5 0
2 years ago
Other questions:
  • Mary is writing an article about the animal kingdom. She wants to place image below the text. Which menu should Mary choose for
    15·2 answers
  • Judd puts password protection on all of his files, makes sure not to have any patient information open on his computer when he t
    12·2 answers
  • Enter a formula in cell B10 to return a value of 35000 if the Net Profit After Tax (cell B9) is greater than or equal to 470000
    15·2 answers
  • Which of the following is NOT a benefit of virtual memory? speed up of process creation increases in the effective access time o
    6·1 answer
  • The spreadsheet below shows the names years in office, and number of terms for five US presidents
    7·2 answers
  • Describe two reasons to use the Internet responsibly. Explain what might happen if the Internet use policies were broken at your
    12·2 answers
  • There are two methods of enforcing the rule that only one device can transmit. In the centralized method, one station is in cont
    5·1 answer
  • Question 1 :Which type of unshielded twisted pair (UTP) cable is commonly used for 1000BASE-T Ethernet networks and is often mad
    8·1 answer
  • Write the state of the elements of each of the following arrays after each pass of the outermost loop of the selection sort algo
    11·1 answer
  • #Write a function called "replace_all" that accepts three #arguments: # # - target_string, a string in which to search. # - find
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!