You have a 255.255.255.240 mask. Which of the following is the valid CIDR notation?

A) /25
B) /26
C) /27
D) /28


D
Explanation: D) The 255.255.255.240 mask converts to 11111111 11111111 11111111 11110000 in binary, which includes 28 mask bits.

Computer Science & Information Technology

You might also like to view...

The function int fact(int k) { return k*fact(k-1); if (k==0) return 1; }

A) computes the factorial on an integer k passed to it as parameter. B) returns the value 1 if it is passed a value of 0 for the parameter k. C) does not correctly handle its base case. D) works for all non-negative values of k, but not for negative numbers. E) None of the above

Computer Science & Information Technology

Which of the following objects cannot trap mouse events?

a. JTextField. b. ButtonGroup. c. JButton. d. JComponent.

Computer Science & Information Technology

What is Focus group?

What will be an ideal response?

Computer Science & Information Technology

Sharing your presentation with others from a shared folder can lead to ________ changes made to your presentation

Fill in the blank(s) with correct word

Computer Science & Information Technology