how many bits will you need to borrow from the host portion to create the required number of subnets? (each bit borrowed doubles the number of subnets.) 2. how many subnets will you create (2 to the power of the number of borrowed bits)? 3. what is the subnet mask for your new subnetted networks? 4. what is the total number of host addresses per subnet (2 to the power of the number of un- borrowed bits)? 5. how many host addresses per subnet are available for devices (the answer to the above question minus 2) 6. build the network ip address scope. if there are more than 8 subnets, show the first 8 and the last one. if there are 8 or fewer subnets, show all subnets. do not show more subnets than you need.

Answers

Answer 1

We can build twice as many subnets when we borrow a host bit, so if we borrow two host bits, we can create four subnets. The number of subnets you can build doubles for every host bit you "steal." 128 + 64 = 192 is the binary to decimal conversion. A new subnet mask of 255.255 will be used.

What is meant by decimal?

The accepted method for representing both integer and non-integer numbers is the decimal numeral system. It is the expansion of the Hindu-Arabic numeral system to non-integer values.A decimal numeral refers broadly to the notation of a number in the decimal numeral system (also frequently merely called a decimal or, less accurately, a decimal number). A decimal separator can occasionally be used to identify decimals (usually "." or "," as in 25.9703 or 3,1415).As in "3.14 is the approximate value of to two decimals," "decimal" may also refer specifically to the digits that follow the decimal separator. The function of zero-digits following a decimal separator is to denote the accuracy of a value.

To learn more about decimal refer to

https://brainly.com/question/26090574

#SPJ4


Related Questions

what are some challenges that existing data centers face as they move toward supporting cloud computing? group of answer choices increased it labor costs to manager the cloud environment. greater energy consumption for the same load of applications.

Answers

As long as you have internet connectivity, cloud computing enables you to access resources, data, services, and applications from anywhere.

What is cloud computing?

Simply described, cloud computing is the distribution of computing services over the Internet ("the cloud"), including servers, storage, databases, networking, software, analytics, and intelligence, in order to provide speedier innovation, adaptable resources, and scale economies.

Here are the main challenges facing cloud computing, in brief:

concerns with cyber security.

cost containment and management.lacking in resources or knowledge.Governance/Control.Compliance.managing several clouds.Performance.creating a private cloud.

Here, there are a number of important difficulties that need to be addressed, including lengthy troubleshooting, application unavailability, migration agents, and cutover complexity.

As long as you have internet connectivity, cloud computing enables you to access resources, data, services, and applications from anywhere. Some tools and strategies will enable you to access information even if you are not connected to the internet.

To learn more about cloud computing refer to:

https://brainly.com/question/19057393

#SPJ4

scarlet is developing a system compliant with the pci dess. waht type of information sithe most likely type she want sto protect

Answers

Organizations that process, store, or transport cardholder data are subject to the PCI DSS set of security standards. It addresses issues including malware prevention, firewalls, authentication, encryption, and incident response.

What is PCI DSS?For businesses that deal with branded credit cards from the main card brands, the Payment Card Industry Data Security Standard (PCI DSS) is a security standard for information.The Payment Card Industry Security Standards Council is in charge of enforcing the PCI Standard, which is imposed by the card companies. In order to tighten safeguards over cardholder data and decrease credit card fraud, the standard was developed.Annual or quarterly [better source needed] validation of compliance is carried out using a technique appropriate to the volume of transactions processed.Assessor of Self-Assessment Questionnaire (SAQ) for Internal Security particular to Firm (ISA)Independent Security Assessor (QSA)Twelve requirements are listed in the PCI Data Security Standard, and they are grouped into six logically linked categories termed "control objectives."

To learn more about PCI DSS refer to:

https://brainly.com/question/28335079

#SPJ4

Other Questions
1. $3.96 x 52. 0.023 x 403. 0.67 x 614. $19.99 x 65. 0.13 x 576. 0.041 x 15 SAL PREPARES HIS FINANCIAL STATEMENTS USING STRAIGHT LINE DEPRECIATION. SAL FILES HIS TAX RETURN USING MACRS.MACHINE DEPRECIABLE BASIS 336,000 LIFE 5 YEARS SALVAGE VALUE 0DATE PLACED IN SERVICE APRIL 1, YEAR 1DATE SOLD JAN 1, YEAR 4 SALES PRICE 127,000 REQUIRED: WHAT IS THE LOSS ON SALE FOR FINANCIAL STATEMENT PURPOSES RECORDED ON JANUARY 1, YEAR 4? (DO NOT ROUND) (INSERT THE AMOUNT ONLY) REQUIRED: WHAT IS THE GAIN ON SALE FOR TAX PURPOSES RECORDED ON JANUARY 1, YEAR 4? (DO NOT ROUND) (INSERT THE AMOUNT ONLY) (INSERT THE AMOUNT ONLY) REQUIRED: WHAT IS THE GAIN ON SALE FOR TAX PURPOSES RECORDED ON JANUARY 1, YEAR 4? (DO NOT ROUND) (INSERT THE AMOUNT ONLY)REQUIRED: WHAT IS SAL'S YEAR 4 M-1 ADJUSTMENT RELATED TO THE SALE? (DO NOT ROUND) (INSERT THE AMOUNT ONLY) REQUIRED: WHAT IS THE NET BOOK VALUE OF THE MACHINE FOR TAX PURPOSES AT DECEMBER 31, YEAR 2? The intrinsic value (not market value) of an asset is the present value of all expected cash flow it is expected to generate. Identify and carefully explain at least three principles of finance in that statement. jayne is having difficulty finding adequate daycare for her child that she can afford on her job. instead of focusing on the negative, she looks at the bright side and realizes that at least she has a good job in a tight economy. jayne is utilizing write a public static method named meterstofeetandinches that will take a single argument of type float and will return a string. when called, and passed a distance value (in meters), this method must compute and return a string value with the equivalent distance in feet and inches. How many grams of calcium chloride will be produced when 27.0 g of calcium carbonate is combined with 11.0 g of hydrochloric acid? kat is fifteen. in most states, for contractual purposes, kat would be considered a minor until she is How can Rabies be Treated? Judy owns 425 shares of stock, with a basis of $2712. The stock split 3 to 1. Judy now owns what? evaluate the organizational tools and scrum-agile principles that helped your team be successful. be sure to reference the scrum events in relation to the effectiveness of the tools. identify one of the major reasons why firstborn children are more likely to die young than children later in birth ordera) Men work in higher-stress occupations.b) Women are more likely to seek medical advice on heart disease.c) Full-time parenting is a stress-reducing activity, and more women than men are full-time parents.d) Men are generally more prone to heart disease for biological reasons. Briefly describe each layer of Earth. Studies done by evolutionary psychologists have found that men are drawn sexually to women who seem ________________, while women are attracted to men who seem ________________. when an electronic mail system is installed as part of the communication system, what element of the communication process is changed? a. sender b. receiver c. message d. filter e. channel Julie buys a pair of earrings for $7. Now she would like to buy the same earrings for 2 of her friends. How much will she spend for all 3 pairs of earrings Why were the early settlers in southeastern North America able to farm very easily?A. they had advanced technology.B.the climate was very warm C. The Europeans taught them farming techniques. there are numerous measures of poverty. the inability of a family to afford the basic necessities such as food to sustain themselves is an example of Why plan your research to make a research easier to do Read this excerpt, then answer the question that follows. It was a town of red brick, or of brick that would have been red if the smoke and ashes had allowed it; but as matters stood, it was a town of unnatural red and black. . . . It was a town of machinery and tall chimneys. Hard Times, Charles Dickens How does the narrator describe the town?A. dirty and industrial B. crowded and busy C. rural and old-fashioned D. pleasant and welcoming before the sit-in protests, who was allowed to sit at the woolworth lunch counter? who wasnt allowed to sit at the woolworth lunch counter?