Which subnet mask should you select

Assignment Help Computer Engineering
Reference no: EM1336621

Your company is assigned the network address 150.50.0.0. You need to create seven subnets on the network. A router on one of the subnets will connect the network to the Internet. All computers on the network will need access to the Internet. What is the correct subnet mask for the network?
a. 0.0.0.0
b. 255.255.0.0
c. 255.255.240.0
d. The subnet mask assigned by InterNIC

A company with the network ID 209.168.19.0 occupies four floors of a building. You create a subnet for each floor. You want to allow for the largest possible number of host IDs on each subnet. Which subnet mask should you choose?
a. 255.255.255.192
b. 255.255.255.240
c. 255.255.255.224
d. 255.255.255.248

Several users are complaining that they cannot access one of your Windows NT file servers, which has an IP address that is accessible from the Internet. When you get paged, you are not in the server room. Instead you are at another company in a friend's office that only has a UNIX workstation available, which also has Internet access. What can you do to see if the file server is still functioning on the network?
a. Use PING from the UNIX workstation.
b. Use ARP from the UNIX workstation.
c. Use WINS from the UNIX workstation.
d. Use DNS from the UNIX workstation.

At one of your company's remote locations, you have decided to segment your class B address down, since the location has three buildings and each building contains no more than 175 unique hosts. You want to make each building its own subnet, and you want to utilize your address space the best way possible. Which subnet mask meets your needs in this situation?
a. 255.0.0.0
b. 255.255.255.0
c. 255.255.0.0
d. 255.255.255.240

Reference no: EM1336621

Questions Cloud

Aggregate planning in manufacturing and services : Explain the differences between aggregate planning in manufacturing and aggregate planning in services.
Impact of cultural diversity on law : Discuss the impact of cultural diversity on law enforcement practices. Identify and discuss trends in diversity in relation to the court and prison systems.
How to support the high bandwidth applications and growth : You have been contracted to create a network for a multimedia development firm that currently uses a 10-Mbps Ethernet network. The company requires a high-bandwidth network for the multimedia team, that constantly views and manipulates large files ..
Explain expert''s approach to- marketing management : Explain Expert's Approach to- Marketing management and Can you discuss your experience as either a consumer or professional with one of the data collection methods
Which subnet mask should you select : Your company is assigned the network address 150.50.0.0. You need to create seven subnets on the network. A router on one of the subnets will connect the network to the Internet. All computers on the network will need access to the Internet. What ..
Pricing in absence of arbitrage opportunity : A McDonalds Big Mac value meal consists of a Big Mac sandwich, large Coke, and a large fry. Assuming that there is a competitive market for McDonalds food items
Comparing statistical analysis : I am working on a graduate level paper about using "Discriminate Analysis and other models" in Bankruptcy prediction and having trouble understanding the basic concepts of the overall nature of this assignment.
Illustrate what will happen to the equilibrium level : Illustrate what will happen to the equilibrium level of income if investors become optimistic about the country's future and raise their investment.
Assess various scenarios as a part of developing forecasts : How is it helpful to assess various scenarios as a part of developing forecasts?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Define the issues that arise from concurrency

examine the issues that arise from concurrency. What are the main concerns when multiple users have access to the same data? How does a DBMS handle these situations? What is locking? How is it resolved.

  Program that has a function named presentvalue

Program that has a function named presentValue

  Project lacking the minority project

Give three examples of why a project might lack the technical feasibility.

  Scripts_new directory and dir.txt file

Write down the following folder structure on C: drive of your computer: Scripts_New, Networking, User.

  Discuss and describe the potential security threats

Discuss and describe the potential security threats

  Program to evaluate case statement

Program to evaluate case statement

  Give the type of clip art found at the sites

search on the Internet for at least 2 additional sites other than Microsoft's that offer clip art, either free or for a price. If you have real-life or professional experience with clip art sites.

  Make a form with a text property of friends

On the Entry tabPage add 4 textboxes to take entry for a first name, last name, birth month, and birthday and add a MaskedTextbox to take entry for a phone number formatted as 999-9999.

  Global economy

Explain why is the global economy so vital today? Explain how the global economy has altered since the mid-twentieth century.

  What is compensation of using rule sets

What is compensation of using rule sets

  Imagine we want to add to the sterling class

a penny may be further divided into halfpennies and farthings -> farthing worth 1/4 of a penny. There was a halfpenny coin, farthing coin, halffarthing coin.

  Implementing gcd in assembly language

Implement this function in the assembly language and write down a test program which calls function many times, passing it several values. Show all results on screen and include screen shots of the outputs.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd