In a block of addresses we know the IP address of one host is Roll no. Roll no. Roll no. Roll no./20.What is the first address and the last address of this block? Find the number of addresses in the block?
Hint: if your roll no is 33 then your ip address will look like this: 33.33.33.33/20
Answer:
If there’s one topic that trips people up (both new and experienced) in the networking industry, it is that of Subnetting.
One of the reasons this happens is that one has to perform (mental) calculations in decimal and also binary. Another reason is that many people have not had enough practice with subnetting.
In this article, we will discuss what Subnetting is, why it came about, its usefulness, and how to do subnetting the proper way. To make this article as practical as possible, we will go through many examples.
Note: While subnetting applies to both IPv4 and IPv6, this article will only focus on IPv4. The same concepts explained here can be applied to IPv6. Moreover, subnetting in IPv6 is more of a want rather than a necessity because of the large address space.
IP address network
For example, any traffic with a destination IP address of 192.168.1.101 will be delivered to PC1, while traffic addressed to 192.168.1.250 will be delivered to SERVER.
Note: This is an oversimplification of things just for understanding sake and refers to Unicast (one-to-one) IPv4 addresses. Traffic sent to Multicast (one-to-many) and Broadcast (one-to-all) IP addresses can be delivered to multiple devices. Also, features like Network Address Translation (NAT) allow one IP address to be shared by multiple devices.
To help your understanding of IP addresses and subnetting, you need to resolve the following fact in your head: Computers think in binary, that is, 0s and 1s. Therefore, even though we see an IP address represented like 192.168.1.250, it is actually just a string of bits – 32 bits in total for IPv4 addresses.
To make them more readable for humans, IPv4 addresses are represented in dotted decimal notation where the 32 bits are divided into 4 blocks of 8 bits (also known as an octet), and each block is converted to a decimal number.
For example, 01110100 in binary is 116 in decimal:
A unicast IPv4 address such as 192.168.1.250 can be divided into two parts: Network portion and Host ID. So what does this mean? Well, IPv4 addresses were originally designed based on classes: Class A to Class E. Multicast addresses are assigned from the Class D range while Class E is reserved for experimental use, leaving us with Class A to C:
Class A: Uses the first 8 bits for the Network portion leaving 24 bits for host IDs. The leftmost bit is set to “0”.
Class B: Uses the first 16 bits for the Network portion leaving 16 bits for host IDs. The two leftmost bits are set to “10”.
Class C: Uses the first 24 bits for the Network portion leaving 8 bits for host IDs. The three leftmost bits are set to “110”.
Note: The range of Class A is actually 1-126 because 0.x.x.x and 127.x.x.x are reserved.
With these classes, a computer/device can look at the first three bits of any IP address and determine what class it belongs to. For example, the 192.168.1.250 IP address clearly falls into the Class C range.
Looking at the Host ID portion of the classes, we can determine how many hosts (or number of individual IP addresses) a network in each class will support. For example, a Class C network will ideally support up to 256 host IDs i.e. from 00000000 (decimal 0) to 11111111 (decimal 255). However, two of these addresses cannot be assigned to hosts because the first (all 0s) represents the network address while the last (all 1s) represents the broadcast address. This leaves us with 254 host IDs. A simple formula to calculate the number of hosts supported
Explanation: Final answer is Start address: 192.168.58.0 + 1 = 192.168.58.1
End address: 192.168.58.16 – 2 = 192.168.58.14
Broadcast address: 192.168.58.16 – 1 = 192.168.58.15
Please help,it’s a year 9 question
Answer:
For an AND gate, Q would be 0,0,0,1 respectively.
See the reference table below.
are used for mechanical power transmission over long distances
A. Spur Gears
B. Helical Gears
C. Planetary Gears
D. Chain and Sprockets
Answer:
D. Chain and Sprockets
Explanation:
Chains and sprockets are power transmission tools. The roller chain is connected to a toothed wheel which is the sprocket. The combination provides mechanical power to the wheels of vehicles.
An advantage they possess is their ability to transmit mechanical power over both short and long distances. They have a high degree of efficiency but they require constant lubrication. They also produce noise during operation.
compared to EMT, IMC is?
When compared to EMT, IMC (intermediate metal conduit) is a thinner and also have a lighter-weight .
What is the comparison in IMC vs. EMTNote that EMT is one that cannot be threaded and is not set up for strong connections like IMC and RMC.
In regards to residential wiring, IMC is known to be the one that is said to be often and usually limited to service entrance assemblies as well as exposed and it often runs to and fro.
Therefore, When compared to EMT, IMC (intermediate metal conduit) is a thinner and also have a lighter-weight .
Learn more about metal conduit from
https://brainly.com/question/5023977
#SPJ1
Help fast
When comparing and what is the main difference?
O The first symbol is for reviewing text and the second for enlarging text.
The first symbol is for spacing and the second for sizing.
O The first symbol is for viewing text and the second for inserting text.
O The first symbol is for inserting text and the second for viewing text.
Answer:
The first symbol is for inserting text and the second for viewing text
Explanation:
of what is famous Ted Nelson?
Answer:
Nelson proposed a system where copying and linking any text excerpt, image or form was possible.
Explanation:
Ted Nelson is one of the theoretical pioneers of the world wide web who is best known for inventing the concept of hypertext and hypermedia in the 1960s. As one of the early theorists on how a networked world would work.
How I know:
I goggle it.
i need help with this
Answer:
Answer is D
Explanation:
cameras did not use disks until the late 1990s :D
edit: sorry my previous answer was wrong, I apoligize for the mishap :(
It's common to print a rotating, increasing list of single-digit numbers at the start of a program's output as a visual guide to number the columns of the output to follow. With this in mind, write nested for loops to produce the following output, with each line 60 characters wide: | | | | | | 123456789012345678901234567890123456789012345678901234567890
Answer:
The program in python is as follows:
for i in range(0,6):
for i in range(0,9):
print(" ",end='')
print("|",end='')
print()
for i in range(1,61):
print(i%10,end='')
Explanation:
See attachment for program output format
The next two instructions create a nested for loop
for i in range(0,6):
for i in range(0,9):
This prints 9 spaces
print(" ",end='')
This prints a vertical line at the top of the end of the spaces printed
print("|",end='')
This prints a new line
print()
This iterates from 1 to 60
for i in range(1,61):
This prints 1, 2, 3....9, then 0, 6 times on a straight line
print(i%10,end='')
to display “ hello ” message on the screen
Answer:
hello like that
it's in order
Please answer today 20 pts!!
Type the correct answer in the box. Spell all words correctly.
Joe is a part of a team where the members come from various cultures and have different perspectives and viewpoints. What does Joe need to
improve in order to work successfully in the team?
In order to work successfully in the team, Joe needs to improve his awareness of _______.
Can only be 1 or 2 words.
Answer:
give each member their own translator and a seprate workspace
sry bout the spelling
Explanation:
What episode and Season of Simpsons is this
Answer:
season 9 episode 23.65 and the bases it 12
Please help ASAP! will mark brianliest! 30 points!
Which popular VPN protocol allows segment access for users?
IPsec
PPTP
L2TP
SSL VPN
Answer:
SSL VPN
Explanation:
Secure Sockets Layer, or SSL VPN, is the second common VPN protocol.
A big plus for SSL VPNs is that they can allow segmented access for users. For example, users can be limited to checking email and accessing shared drives rather than having access to the entire network.
SSL VPNs come in two types, SSL portal and SSL tunnel.
SSL Portal VPNs
SSL Portal VPNs allow a user to securely access the web from a browser once the user logs into the VPN’s online portal using a specified method of authorization.
This type of SSL VPN gets its name because of how the user accesses it – through a single web page, or portal. The page acts as a single gateway to the other services available on the secured network.
SSL Tunnel VPNs
SSL Tunnel VPNs allow the user to not only access the web securely, but to also use applications and other network services that aren’t based on the web.
Due to their sophisticated segmentation capabilities, SSL VPNs often require more skill to implement.
VPNs are not a cure-all
Of course, what you could do is circumvent the entire debate around VPN SSL vs IPSEC. Our Gatekeeper offering is an enhanced alternative to VPN with no client, that still offers two-factor authentication to secure remote access.
Wherever you land between VPN SSL vs IPSEC, of if you join #TeamGatekeeper, having one of these tools to protect web traffic is a great way to help secure information, but it’s not an end-all be-all security solution.
After all, a VPN won’t protect your employees from social engineering attacks such as email phishing.
(hope this helps can i plz brainlist it will make my day :D hehe)
The Stability and Growth Part has to do with _____.
bank reserves
the Economic and Monetary Union
U.S. trade
global money market
Answer:
The Stability and Growth Pact (SGP) is an agreement, among the 27 member states of the European Union, to facilitate and maintain the stability of the Economic and Monetary Union (EMU). ... The purpose of the pact was to ensure that fiscal discipline would be maintained and enforced in the EMU.
Explanation:
follow me for more
What is the correct order for writing the 3 dimensions for a 3D object? Here are the 3 dimensions:
Width
Height
Length
They need to be written in this format: ___________X___________X___________
Fill in the blanks.
for my sibling.
Answer:
Length x Width x Hight
Explanation:
what percent of records are temporary, if you are not in the OSD?
Answer:
Headed by the OSD Records Administrator, the OSD Records and Information Management (RIM) Program is responsible for oversight, implementation of the Federal Records Act within the Offices of the Secretary of Defense and the WHS supported Defense Agencies and Field Activities.
Explanation:
If you wanted to use the numeric key pad to multiply 8 and 5 and then divide by 2, you would type
1. 8/5*2
2. 5/2/8
3. 8*5*2
4. 8*5/2
Answer:
Option 4 would be your best answer
Explanation:
The * means multiply
And the / means Divide
Hope this helps :D
PLZZ HELPP MEE!!
What projects would Excel best be used for? Be sure to say the name of the project and how you would go about creating it.
Which of the following are advantages of converting analog audio to digital audio? Choose all that apply
Reduction in editing time
Consistently accurate copies of audio recordings
Preservation
Susceptibility to computer viruses
Answer:
b and c
Explanation:
sorry if there wrong
Answer: A, B, and C
Explanation:
Numerical methods are implementations of mathematical algorithms, but constructed with special consideration for accuracy of solutions and computational run-time. The order in which we implement floating point arithmetic for any numerical method will effect the accuracy of the final computed value. For this reason, extra thought must be placed on our basic mathematical operations. In this problem, you are asked to add-up the values in a large array called data. How should you do this to achieve the most accurate final sum
Answer:
find detailed description of algorithms (direct and iterative methods) in books [8], [3], [24]. We limit ourself to only selected problems and methods which are important in chemical engineering. 1.2.1 Conditioning of a system of linear equations We do not compute accurately because of rounding errors, which affect results of calcu-lations.
Explanation:
What is the final gear reduction of a compound gear reduction of 36 to 12 for the first stage and 60 to 12 for the second stage?
A. 0.067
B. 0.533
C. 8
D. 15
Answer:
8
Explanation:
Gear reduction = driven gear teeth / driving gear teeth
First stage reduction :
Driven gear teeth = 36
Driving gear teeth = 12
36 /12 = 3
Second stage reduction :
Driven gear teeth = 60
Driving gear teeth = 12
60 /12 = 5
First stage + second stage
3 + 5 = 8
which of the following is not a benefit of aws cloud computing
Mrs. Toma is preparing a marksheet of Final term using Excel. She needs to 1
add a new subject title in the worksheet. Now, which component does she
need to add in her marksheet?
Answer:
a
Explanation:
If we use 6 bits for representing positive and negative numbers using 2's
complement methods, what is the value of 11100?
Use the drop-down menus to complete statements about archiving and backing up data fileArchiving data files manages the size of a mailbox for storage.
Creating an Outlook data file
data files in storage on a computer.
Answer:
Archiving data files manages the size of a mailbox for
✔ local
storage.
Creating an Outlook data file
✔ protects
data files in storage on a computer.
Explanation:
Because its right.
Answer:
an increase in cloud computing
Explanation:
HELP PLS
Which technologies have made global communication instant and more effective? Choose THREE answers.
social media
wireless devices
smart phones
automobiles
printed newspapers
Answer:
(1). social media
(2). wireless devices
(3). smart phones
Explanation:
The three technologies that have made global communication instant and more effective are social media, wireless devices, and smart phones.
Here,
Social media platforms have revolutionized the way people communicate globally. They allow individuals to connect, share information, and communicate with others in real-time, regardless of geographical location.
Wireless devices, such as laptops, tablets, and smartwatches, have eliminated the need for physical connections like cables and wires. They allow users to access the internet and communicate with others from virtually anywhere with a wireless signal.
Smartphones combine the features of a mobile phone with advanced computing capabilities. They provide instant communication through voice calls, text messages, emails, and various messaging apps.
Smartphones also allow users to access social media platforms and use wireless internet, making global communication more convenient and efficient.
Know more about communication technologies,
https://brainly.com/question/33037966
#SPJ6
Need help ASAP. Will mark brainliest!
Which of the following is assigned to every network device?
Digital address
Logical address
MAC address
Personal address
A feature which is assigned to every (all) network device is: C. MAC address.
What is a MAC address?MAC address is an abbreviation for media access control address and it can be defined as a unique identifier that is generally assigned by manufacturers to a network interface controller (NIC) of every (all) network device, especially for use as a network address when the device is communicating with other network devices within a network segment.
This ultimately implies that, media access control address (MAC address) is a feature which is assigned to every (all) network device by the manufacturers.
Read more on MAC address here: https://brainly.com/question/25246068
Answer: MAC Address
Explanation: Took the test and it was right :)
Use three or more sentences to explain to someone why they might need to use a virtual machine.
Answer:
Benefits of Virtualization
Reduced capital and operating costs.
Minimized or eliminated downtime.
Increased IT productivity, efficiency, agility and responsiveness.
Faster provisioning of applications and resources.
Greater business continuity and disaster recovery.
Simplified data center management.
Please hellppp,is a yr 9 question
Answer:
See picture below.
Implement the ArrayMethod application containing an array that stores eight integers. The application should call the following five methods: 1. display - should display all the integers 2. displayReverse - should display all the integers in reverse order 3. displaySum - should display the sum of the integers 4. displayLessThan - should display all values less than a limiting argument 5. displayHigherThanAverage - should display all values that are higher than the calculated average value.
Answer:
public static void display(int [] arr){
System.out.print("Arrays: ");
for(int i =0;i<arr.length;i++){
System.out.print(arr[i]+" ");
}
System.out.println();
}
public static void displayReverse (int [] arr){
System.out.print("Arrays in reverse order: ");
for(int i=arr.length-1;i>=0;i--){
System.out.print(arr[i]+" ");
}
System.out.println();
}
public static int displaySum (int [] arr){
System.out.print("Sum: ");
int sum = 0;
for(int i =0;i<arr.length;i++){
sum+=arr[i];
}
return sum;
}
public static void displayLessThan (int [] arr, int num){
System.out.print("Less than "+num+": ");
for(int i =0;i<arr.length;i++){
if(arr[i]<num){
System.out.print(arr[i]+" ");
}
}
System.out.println();
}
public static void displayHigherThanAverage (int [] arr){
System.out.print("Higher than average: ");
int sum = 0;
for(int i =0;i<arr.length;i++){
sum+=arr[i];
}
float average = sum/arr.length;
for(int i =0;i<arr.length;i++){
if(arr[i]>average){
System.out.print(arr[i]+" ");
}
}
System.out.println();
}
Explanation:
The methods were written in Java. See attachment for explanation where I used comments to explain each lines.
Note that lines that begin with double slash (//) are comments
Select the correct answer.
A computer using a connectionless network protocol sends too many data packets to another computer, causing loss of a few packets. As a result, the message appears jumbled to the user at the destination computer. How does TCP overcome this issue?
A.
by using flow control
B.
by using cables
C.
by using terminals
D.
by using a larger IP address
Please only answer if you are 100% sure
Answer:
D by using a larger IP address correct
Explanation:
Correct answer I hope this helps you :)