The basic idea behind ____________________ is to take the host ID portion of an IP address and further divide it into a subnet ID and a host ID.

Fill in the blank(s) with the appropriate word(s).


subnet masking

Computer Science & Information Technology

You might also like to view...

Most physical security plans are developed separately from the planning that defines the activities of the information security process.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

There are three basic Notes ____________________: Icon, Notes List, and Last 7 Days.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

All of the following would be likely candidates for Bluetooth connectivity EXCEPT a(n) ________

A) internal hard drive B) ergonomic keyboard C) mouse D) inkjet printer

Computer Science & Information Technology

By default, NIS configuration is handled by the ____.

A. CUPS software B. DHCP server C. netconfig script D. portmapper

Computer Science & Information Technology