How many bits will be used for the subnet id

Assignment Help Management Information Sys
Reference no: EM13998073

  1. We wish to create 8 subnets in a /24 network. Assume that we wish to use the minimum number of bits for the subnet id.

A. How many bits will be used for the subnet id?

B. How many possible hosts are there on each subnet?

C. What is the mask in binary and dotted decimal notation?

 

Reference no: EM13998073

Questions Cloud

Web diagram organizing the following specific technologies : Create a table or web diagram organizing the following specific technologies (as discussed in your textbook) in the order they would appear in an IT network connected to the internet:  Vulnerability scanners Firewalls
Access control systemsaccess control : Access Control SystemsAccess Control Guidelines based on Data Classification Assignment RequirementsAssume you are a security engineer for a corporation. This corporation has developed a classification scheme as follows
Prompts the user to input an integer between 0 and 35 : The first line indicates that the box ticket price is $250 and 5750 tickets were sold at that price. Please type above information into a text file and write a program to read those data and output the number of tickets sold and the total sale amo..
Describe the earned value management terms : Describe issues in project cost estimating and how to deal with each. Describe the earned value management terms
How many bits will be used for the subnet id : We wish to create 8 subnets in a /24 network. Assume that we wish to use the minimum number of bits for the subnet id. A. How many bits will be used for the subnet id?
What is the nature of the litigation was the case an appeal : Outline the specific legal question(s) that was before the court. If the court addressed multiple issues address each separately. Your issues should be concisely stated and specific, mot generalizations.
What distance does the satellite travel in one day : A satellite orbits at a distance from the Earth's center of about 7.40 Earth radii and takes 28.3 hours to go around once. What distance (in meters) does the satellite travel in one day? What is its orbital velocity (in m/s)?
Gem infosys, a small software company : Gem Infosys, a small software company, has decided to better secure its computer systems after a malware attack shut down its network operations for 2 full days. The organization uses a firewall, three file servers, two Web servers, one Windows 2008 ..
Examine the various alternatives available : Using the Web, search for four (4) "software firewalls."  Examine the various alternatives available and compare their functionality, cost, features, and type of protection.  Create a weighted ranking according to your own evaluation of the features ..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Write research paper about data communication

Write research paper about Data Communication

  What is the estimated amount of time for implementation

Determine the medium through which the office staff prefers to communicate, wether it is a presentation, e-mail or a printed presentation. Knowing my audience will help me to understand their specific needs and not just the message that I want to ..

  The problem to be addressed in this study pertains to the

the problem to be addressed in this study pertains to the impact of international trade agreement ita and intellectual

  Evaluate the eoq/els for the two cases

Ordering and holding costs associated with the Director of Purchasing's policies and evaluate the EOQ/ELS for the following two cases. Include full calculations

  Wireless home network

From the e-activity, identify the key reasons for selecting your wirless home router. Discuss the type of encryption it uses and explain the reason(s) why you believe this method of encryption is more superior than its contemporaries.

  Features about windows 7 and windows 8

Read the article titled "The Windows XP upgrade question: Windows 7 or Windows 8?" You can also use the Internet or Strayer Library to research articles on features about Windows 7 and Windows 8

  Identify the form validation rules

Identify the form validation rules that need to be put in place for the login form and the registration form. What format should the data have? What is the maximum length of each item

  Perform data analysis and determine data quality

Perform data analysis and determine data quality and the feasibility of building a common identifier for a child

  Coordination cooperation and collaborationcan you help me

coordination cooperation and collaborationcan you help me get started on this

  Twyla enterprises uses a computer for sales invoices retain

twyla enterprises uses a computer for sales invoices retain or replace the machinetwyla enterprises uses a word

  Cincinnatti software scheduling techniquecincinnatti

cincinnatti software scheduling techniquecincinnatti software which currently specializes in the installation of

  Forward and reverse supply chain management

Describe in detail how and why a company should manage both forward and reverse supply chain management. Include what they should focus on to improve their customer service levels.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd