Which subnet mask should you select

Assignment Help Computer Engineering
Reference no: EM1336621

Your company is assigned the network address 150.50.0.0. You need to create seven subnets on the network. A router on one of the subnets will connect the network to the Internet. All computers on the network will need access to the Internet. What is the correct subnet mask for the network?
a. 0.0.0.0
b. 255.255.0.0
c. 255.255.240.0
d. The subnet mask assigned by InterNIC

A company with the network ID 209.168.19.0 occupies four floors of a building. You create a subnet for each floor. You want to allow for the largest possible number of host IDs on each subnet. Which subnet mask should you choose?
a. 255.255.255.192
b. 255.255.255.240
c. 255.255.255.224
d. 255.255.255.248

Several users are complaining that they cannot access one of your Windows NT file servers, which has an IP address that is accessible from the Internet. When you get paged, you are not in the server room. Instead you are at another company in a friend's office that only has a UNIX workstation available, which also has Internet access. What can you do to see if the file server is still functioning on the network?
a. Use PING from the UNIX workstation.
b. Use ARP from the UNIX workstation.
c. Use WINS from the UNIX workstation.
d. Use DNS from the UNIX workstation.

At one of your company's remote locations, you have decided to segment your class B address down, since the location has three buildings and each building contains no more than 175 unique hosts. You want to make each building its own subnet, and you want to utilize your address space the best way possible. Which subnet mask meets your needs in this situation?
a. 255.0.0.0
b. 255.255.255.0
c. 255.255.0.0
d. 255.255.255.240

Reference no: EM1336621

Questions Cloud

Aggregate planning in manufacturing and services : Explain the differences between aggregate planning in manufacturing and aggregate planning in services.
Impact of cultural diversity on law : Discuss the impact of cultural diversity on law enforcement practices. Identify and discuss trends in diversity in relation to the court and prison systems.
How to support the high bandwidth applications and growth : You have been contracted to create a network for a multimedia development firm that currently uses a 10-Mbps Ethernet network. The company requires a high-bandwidth network for the multimedia team, that constantly views and manipulates large files ..
Explain expert''s approach to- marketing management : Explain Expert's Approach to- Marketing management and Can you discuss your experience as either a consumer or professional with one of the data collection methods
Which subnet mask should you select : Your company is assigned the network address 150.50.0.0. You need to create seven subnets on the network. A router on one of the subnets will connect the network to the Internet. All computers on the network will need access to the Internet. What ..
Pricing in absence of arbitrage opportunity : A McDonalds Big Mac value meal consists of a Big Mac sandwich, large Coke, and a large fry. Assuming that there is a competitive market for McDonalds food items
Comparing statistical analysis : I am working on a graduate level paper about using "Discriminate Analysis and other models" in Bankruptcy prediction and having trouble understanding the basic concepts of the overall nature of this assignment.
Illustrate what will happen to the equilibrium level : Illustrate what will happen to the equilibrium level of income if investors become optimistic about the country's future and raise their investment.
Assess various scenarios as a part of developing forecasts : How is it helpful to assess various scenarios as a part of developing forecasts?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd