Repeat problem 9 with the subnet mask changed to 255.255.0.0. Show your work.

What will be an ideal response?


They are not in the same subnet; therefore, the data packet is sent to the gateway.
10. 10. 5. 1
255. 255. 0. 0
10. 10. 0. 0 (destination network)

10. 5. 10. 2
255. 255. 0. 0
10. 5. 0. 0 (destination network; note that it differs)

Computer Science & Information Technology

You might also like to view...

____________________ are similar to photo styles and include shapes, angles, borders, and reflections.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The guarantees offered by conventional servers may be violated by:

i) physical damage to the host; ii) Errors or inconsistencies by system adminstrators or their managers; iii)successful attacks on the security of the system software; iv)hardware or software errors. Give two examples of possible incidents for each type of violation. Which of them could be described as a breach of trust or a criminal act? Would they be breaches of trust if they occurred on a personal computer that was contributing some resources to a peer-to-peer service? Why is this relevant for peer-to-peer systems?

Computer Science & Information Technology

The size of a thread pool in Windows XP is ________.

a) constant and specified by the programmer for each process b) constant for all processes on a system c) variable, modified by the system in response to the volume of requests d) all of the above are possible

Computer Science & Information Technology

Some Web-based encrypted e-mail systems—such as the popular free ____ service—require both the sender and recipient to have accounts through that system.

A. CryptMail B. Quietmail C. Hushmail D. PrivateMail

Computer Science & Information Technology