What is the subnet mask

Assignment Help Basic Computer Science
Reference no: EM13878470

Subnet the IP Address 172.16.3.5 to provide 25 networks with 2000  hosts.

a.What is the Subnet Mask: ____________________

b.What is the CIDR value: ________

c.What is the first usable IP on the 9 h usable Network:

____________________

d.What is the last usable IP on the 15th usable Network

Reference no: EM13878470

Questions Cloud

Planning horizon and an interest rate : Let's suppose that there are 3 options:  buying more land, filling wetlands at the rear of the site, or building a multilevel garage on the present lot.  Assume a forty-year planning horizon and an interest rate of 9% per year.  Use present worth ..
Sole proprietorship and changing to corporation : Jumpin-JehoSaphats is owned by Jessica Jean (JJ) Saphats. Jessica wants to incorporate her business but is not sure of the differences between the current form of sole proprietorship and changing to a corporation.   She has come to you to discuss the..
What is the firms intrinsic value today : Terrell Enterprises recently paid a dividend, D0, of $1.50. It expects to have non constant growth of 25% for 2 years followed by a constant rate of 6% thereafter. The firm's required return is 12%. What is the firm's intrinsic value today?
Discuss categories of ratios with help of suitable example : What do you mean by horizontal and vertical analysis of financial statements? Discuss the categories of Ratios with the help of suitable example. Explain the concept of working capital. Discuss the working capital management strategies. Elaborate Rev..
What is the subnet mask : Subnet the IP Address 172.16.3.5 to provide 25 networks with 2000  hosts. a.What is the Subnet Mask: ____________________ b.What is the CIDR value: ________
Weighted-average shares outstanding : A company's net income is $100,000, and its weighted-average shares outstanding are 20,000. During the year, the company issues 5,000 ESOs at an exercise price of $20. What will be the basic EPS if average stock price during the year is $35 and treas..
Disadvantage for the issuer of preferred stock : Preferred stock offers the issuing corporation and investors advantages and disadvantages. Which of the following statements describes a disadvantage for the issuer of preferred stock? Firms that invest in companites' preferred stock may exclude 70% ..
Semiannual coupon bond matures : An 7% semiannual coupon bond matures in 4 years. The bond has a face value of $1,000 and a current yield of 7.4185%. What is the bond's price? What is the bond's YTM?
Cost of goods sold : The following data refer to one year. Fill in the blanks.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Guidelines regarding the initial comment section

Observe the usual guidelines regarding the initial comment section, indenting, and so on.  In addition,

  Discuss roles in a pci dss security assessment

The primary roles involved in a Payment Card Industry Data Security Standard (PCI DSS) security assessment are merchant, merchant's security personnel, merchant's networking personnel, service providers (if any), payment brand (such as Visa and Maste..

  Discuss how current or potential employers

From the e-Activity, discuss how current or potential employers might be able to use the information you found and possible steps that could be taken to help ensure your privacy. Provide specific examples to support your response.

  Write a method named maxelement

Write a method named maxElement, which returns the largest value in an array that is passed as an argument. The method should use recursion to find the largest element. Demonstrate the method in a program.

  Scrum vs plan-based software development strategies

Scrum vs. Plan-Based Software Development Strategies

  Determine general security architecture for the company

Determine the most important assets of the company, which must be protected, Determine general security architecture for the company

  Create a program that asks users to enter the name

Create a program that asks users to enter the name of their favorite team. Have the program display this team's name. Then have program ask the user to enter the name of their five previous oponents,

  Write a program that creates a binary tree from an array

Write a program that creates a Binary Tree from an array of integers, goes through it using inorder traversal (saving that to another array), then makes another balanced binary tree.

  What are all possible values of the ack field

What are the possible sets of sequence numbers inside the sender's window at time t? Justify your answer.What are all possible values of the ACK field in all possible messages currently propagating back to the sender at time t? Justify your answer.

  Compute the data rate of the human eye using information

Compute the data rate of the human eye using the following information. The visual field consists of about 106 elements (pixels). Each pixel can be reduced to a superposition of the three primary colors.

  Write a risk management policy for an organization

write a risk management policy for an organization. Please include all elements covered (assets, resources, etc.)

  What are the inputs processing and outputs of upss package

What are the inputs, processing, and outputs of UPS's package tracking system

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd