Repeat problem 9 with the subnet mask changed to 255.255.0.0. Show your work.
What will be an ideal response?
They are not in the same subnet; therefore, the data packet is sent to the gateway.
10. 10. 5. 1
255. 255. 0. 0
10. 10. 0. 0 (destination network)
10. 5. 10. 2
255. 255. 0. 0
10. 5. 0. 0 (destination network; note that it differs)
You might also like to view...
____________________ are similar to photo styles and include shapes, angles, borders, and reflections.
Fill in the blank(s) with the appropriate word(s).
The guarantees offered by conventional servers may be violated by:
i) physical damage to the host; ii) Errors or inconsistencies by system adminstrators or their managers; iii)successful attacks on the security of the system software; iv)hardware or software errors. Give two examples of possible incidents for each type of violation. Which of them could be described as a breach of trust or a criminal act? Would they be breaches of trust if they occurred on a personal computer that was contributing some resources to a peer-to-peer service? Why is this relevant for peer-to-peer systems?
The size of a thread pool in Windows XP is ________.
a) constant and specified by the programmer for each process b) constant for all processes on a system c) variable, modified by the system in response to the volume of requests d) all of the above are possible
Some Web-based encrypted e-mail systems—such as the popular free ____ service—require both the sender and recipient to have accounts through that system.
A. CryptMail B. Quietmail C. Hushmail D. PrivateMail