How many addresses are left

Assignment Help Basic Computer Science
Reference no: EM131052108

An organisation has been granted a block of addresses starting with the address 172.154.60.0/24.

a) Create 4 subnets for this organisation with the first subblock of 120 addresses, the second subblock of 60 addresses, the third subblock of 30 addresses and the fourth subblock of 12 addresses. (1.5 marks for each correct answer)

b) How many addresses are left?

Reference no: EM131052108

Questions Cloud

Prepare all journal entries for denizen corporation : On December 1, 2008, Denizen Corporation entered into a 120-day forward contract to purchase 20,000 Canadian dollars (C$). Prepare all journal entries for Denizen Corporation.
Classify the kinds of data analysis and statistical methods : classify the kinds of data analysis and statistical methods
Oxidation-reduction potential difference : The relationship between an oxidation-reduction potential difference and the standard free energy change is (where n is the number of moles of electron transferred, F= Faraday's constant and E°= standard oxidation-reduction potential difference)
Calculate the contribution to income : Prepare a spreadsheet like the following one to calculate the contribution to income if the special= order is accepted. Construct formulas so that the number of cases or the price could be changed and the new contribution would be automatically ca..
How many addresses are left : Create 4 subnets for this organisation with the first subblock of 120 addresses, the second subblock of 60 addresses, the third subblock of 30 addresses and the fourth subblock of 12 addresses. (1.5 marks for each correct answer)
Tailored to particular types of organizations : Why is it important to have a chart of accounts that is tailored to particular types of organizations rather than one chart of accounts that applies to all types of organizations?
Describe how would handle situation using normative ethics : In applied ethics, you do not deal with the facts of individual cases. You focus on applying ethical rules to a class of cases. Describe the class or type of case represented here.
Three examples of organizations : Give at least three examples of organizations that have used IS in innovative ways to gain competitive advantage. For each example, which of Porter's framework elements does it illustrate?
Blistering of the skin and mucous membranes : Pemphigus is a disease characterized by blistering of the skin and mucous membranes. This is caused by antibodies attacking proteins on skin cells that keep them glued together, leading to the cell separation and blistering. What type of hypersens..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Beat the hacker-audits and assessments

Provide a least two examples of security knowledge that would assist you in preparing for or preventing a threat. Explain the time-sensitive nature of the knowledge.

  Fully web-based access for both general public and secretary

Fully web-based access for both general public and Secretary of state employees a database of drivers and their personnel information contained on their drivers licenses

  Compare and contrast the major microeconomic failures

Essay Topic: Compare and contrast the major microeconomic failures and macroeconomic failures that you learned this semester.To get you started concentrate on two distinct chapters in the Schiller textbook. See chapter 4 for an analysis of the prob..

  How different backgrounds work with the fonts

Your presentation should include information about font size and icons, how they look with different backgrounds, and how different backgrounds work with the fonts.

  Compare the processors'' access to main memory

Give a true-to-life example where the symmetric configuration might be preferred.

  Investigating storage options

Dan is a small business owner who depends on his computer to keep track of customer and sales data. He is investigating storage options because it is critical for him to ensure that his data is safe in the event of a computer failure.

  Discuss the relative performance needs of the following app

Discuss the relative performance needs of the following applications, in terms of average bandwidth, peak bandwidth, latency, jitter, and loss tolerance:

  Explain why your technique is lossless and not lossy

Devise a way to compress the following list of last names using a lossless technique. Describe your method and show the compressed list. Explain why your technique is lossless and not lossy.

  Recognize and explain six basic computer operations

Recognize the six basic computer operations. Describe each operation's role in computer program and indicate whether it is part of program's input component,

  Differentiate matrix and blosum matrix

Write down the difference between matrix and a Blosum60 Blosum20 matrix? If one uses one and when other? What is meant by Clustal and summarize the operation.

  What is the code to remove the space at the end of string

What is the code to remove the space at the end of the string below and return the result in a textbox? Dim d As String = "CSC 232 " 2. What is the code to display just the text "232" from the string "CSC 232" in a textbox?

  Give the contents of eax

in each additional instruction in this problem, assume that EAX contains a given contents before the instruction is executed, and give the contents of EAX as well as the values of the CF, OF, SF, and ZF flags after the instruction is executed:

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd