You have a 255.255.255.240 mask. Which of the following are valid host addresses?

A) 192.168.10.210
B) 192.168.10.32
C) 192.168.10.94
D) 192.168.10.112
E) 192.168.10.127


A, C
Explanation:
A) The correct answers are 192.168.10.210 and 192.168.10.94 because, using the mask given, you calculate all the values of 16 (magic number), which would yield 192.168.10.94 and 192.168.10.210.
C) The correct answers are 192.168.10.210 and 192.168.10.94 because, using the mask given, you calculate all the values of 16 (magic number), which would yield 192.168.10.94 and 192.168.10.210.

Computer Science & Information Technology

You might also like to view...

To make a layout container the ________ node in a scene graph, select the layout container, then select Scene Builder’s Edit > Trim Document to Selection menu item.

a. base b. root c. origin d. start

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. Any algorithm that can be coded with recursion can also be coded with an iterative structure. 2. When recursion is used on a linked list, it will always display the contents of the list in reverse order. 3. The speed and amount of memory available to modern computers diminishes the performance impact of recursion so much that inefficiency is no longer a strong argument against it. 4. All mathematical problems are designed to be more efficient using recursive solutions.

Computer Science & Information Technology

____ is the most commonly used transport protocol, and so it is most typically encapsulated in a remote access protocol for transport over a WAN.

A. IPX B. TCP C. NetBIOS D. TCP/IP

Computer Science & Information Technology

The scam known as ________ typically comes in the form of an alert message that claims to be from the FBI or your security software.

A. RAID B. pretexting C. scareware D. DDoS

Computer Science & Information Technology