what is subnetting. what does subnetting mean

Answers

Answer 1

Answer:

Subnetting is the practice of dividing a network into two or more smaller networks. It increases routing efficiency, enhances the security of the network and reduces the size of the broadcast domain.

Explanation:


Related Questions

Write a program that asks the user to enter an international dialing code and then looks it up in the country_codes array (see Sec 16.3 in C textbook). If it finds the code, the program should display the name of the corresponding country; if not, the program should print an error message. For demonstration purposes have at least 20 countries in your list.

Answers

Answer:

Explanation:

The following code is written in Python, it prompts the user for a country code, look it up and if found prints out the corresponding country name. If not it prints out an error message stating "Code not found"

country_codes = {"Argentina": 54, "Bangladesh": 880,

        "Brazil": 55, "Burma (Myanmar)": 95,

        "China": 86, "Colombia": 57,

        "Congo: Dem. Rep. of": 243, "Egypt": 20,

        "Ethiopia": 251, "France": 33,

        "Germany": 49, "India": 91,

        "Indonesia": 62, "Iran": 98,

        "Italy": 39, "Japan": 81,

        "Mexico": 52, "Nigeria": 234,

        "Pakistan": 92, "Philippines": 63,

        "Poland": 48, "Russia": 7,

        "South Africa": 27, "South Korea": 82,

        "Spain": 34, "Sudan": 249,

        "Thailand": 66, "Turkey": 90,

        "Ukraine": 380, "United Kingdom": 44,

        "United States": 1, "Vietnam": 84}

user_code = int(input("Enter Country code: "))

keys = list(country_codes.keys())

vals = list(country_codes.values())

if user_code in vals:

   print(keys[vals.index(user_code)])

else:

   print("Code not found")

how to be safe through internet? and what is e safety definition and what are the the rules of e safety pls pls I will give u 74 points lessgooo ​

Answers

Here are the Top 10 Internet safety rules to follow to help you avoid getting into trouble online (and offline).

1. Keep Personal Information Professional and Limited

Potential employers or customers don't need to know your personal relationship status or your home address. They do need to know about your expertise and professional background, and how to get in touch with you. You wouldn't hand purely personal information out to strangers individually—don't hand it out to millions of people online.

2. Keep Your Privacy Settings On

Marketers love to know all about you, and so do hackers. Both catsometimes(detsometimes hard to find because companies want your personal information for its marketing value. Make sure you have enabled these privacy safeguards, and keep them enabled.

3. Practice Safe Browsing

You wouldn't choose to walk through a dangerous neighborhood—don't visit dangerous neighborhoods online. Cybercriminals use lurid content as bait. They know people are sometimes tempted by dubious content and may let their guard down when searching for it. The Internet's demimonde is filled with hard-to-see pitfalls, where one careless click could expose personal data or infect your device with malware. By resisting the urge, you don't even give the hackers a chance.

4. Make Sure Your Internet Connection is Secure. Use a Secure VPN Connection

When you go online in a public place, .Careful What You Download

A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather. As PCWorld advises, don't download apps that look suspicious or come from a site you don't trust

6. Choose Strong Passwords

Passwords are one of the biggest weak spots in the whole Internet security structure, but there's currently no way around them. And the problem with passwords is that people tend to choose easy ones to remember (such as "password" and "123456"), which are also easy for cyber thieves to guess. Select strong passwords that are harder for cybercriminals to demystify. Password manager software can help you to manage multiple passwords so that you don't forget etc... .....

follow me entrust

Answer:

안녕

from my opinion don't tell anyone anything about you like be anonymous

and if anyone ask you where u live say earth he /she will think u became angry or for example you said to person 1 ( you stay in England )

but to person 2 ( say to stay in Japan )

but it's good to say nothing about you not even your name or age

I HOPE YOU UNDERSTAND ENGLISH IF NOT I CAN REWRITE IT IN KOREAN

Michael needs to ensure that those items that are automatically archived are still easily accessible within Outlook. Which option should he configure?

Answers

Answer:

show archive in folder list

Answer:

d

Explanation:

Basic python coding, What is the output of this program? Assume the user enters 2, 5, and 10.
numA = 0
for count in range(3):
answer = input ("Enter a number: ")
fltAnswer = float(answer)
numA = numA + fltAnswer
print (numA)
Thanks in advance!
:L

Answers

Answer:

17.0

Explanation:

I ran it for you. You could also try that (go to replit).

Can two computers be assigned to one IP address

Answers

Answer:

two computers cannot have the same public (external) IP address unless they are connected via the same router. If they are connected via the same router, then they can have (share) the same public IP address yet have different private (local) IP addresses

Explanation:

Answer: maybe

Explanations: two computers cannot have the same public (external) IP address unless they are connected via the same router. If they are connected via the same router, then they can have (share) the same public IP address yet have different private (local) IP addresses.

PLEASE DO THIS QUESTION IN PYTHON
You will write two programs for this endeavor. The first will be a class definition module, and
the second will be the driver program. (Remember the naming rules for these modules!)
The class module should contain the following:
1. An initializer method that accepts two parameters (other than self):
a. A parameter corresponding to the name of the food
b. A parameter corresponding to the amount of the food (in pounds) to order
However, the initializer method should contain four hidden attributes:
a. The name of the food - to be updated using the food parameter
b. The amount in pounds - to be updated using the amount parameter
c. The standard price of the food item per pound - to be updated using a private
method
d. The calculated price of the ordered item (based on amount ordered) – to be
updated using a public method
2. A private method that will store the list of items and their price per pound (in other
words, the information provided in the table above). The method accepts no
parameters (other than self) and returns no value. Use an if-elif structure to set the
standard prices of the food. Reference the hidden attributes of food name and standard
price to set the prices.
Use the header of the method is (provided below) as well as the pseudocode to
complete this method:
#use this header (note the __ before the name)
def __PriceList(self):
if foodname is 'Dry Cured Iberian Ham' #write in actual python
then standardprice is 177.80
#complete the method…
Make sure to include a trailing else that sets the price to 0.00 if an item that is not on
the table is referenced (or if an item is misspelled J )
3. A public method to calculate the cost of the ordered food. The cost should be calculated
using the formula:
Amount of food (in pounds) x price per pound
The method accepts no parameters (other than self), but returns the calculated cost.
4. Accessors as needed (or an __str__ method if you prefer).
The driver program will import the class module you created. This module should contain the
following components:
1. A function that creates a list of objects. The function accepts no parameters but returns
the list of objects. The function should:
a. Create an empty list.
b. Prompt the user for the number of items. This value will be used to determine
the number of repetitions for a necessary loop. (Make sure to include input
validation to ensure that the number of items purchases is at least 1.)
c. Contain a loop that prompts the user for the name of the item and the amount
of the item in pounds. (Make sure to include input validation to ensure that the
number of pounds is greater than 0.) The loop should use this information to
create an object, and append the object to the list
d. Returns the list (once the loop is completed)
2. A function to display the contents of the list. This function accepts a list of objects as a
parameter but does not return a value. The function should:
a. display the contents of each object in the list (all 4 attributes). Make sure to
include appropriate formatting for prices.
3. A function that calculates the total cost of all items. Recall, your object will only have the
cost of each item (based on the amount of pounds ordered for that item). This function
accepts the list of objects as a parameter and returns a value. This function should:
a. access the individual cost of each ordered item
b. calculate the total cost of all the items in the list
c. return the total cost
4. A main function. Your main function should:
a. Call the three aforementioned functions
Dry Cured Iberian Ham $177.80
Wagyu Steaks $450.00
Matsutake Mushrooms $272.00
Kopi Luwak Coffee $317.50
Moose Cheese $487.20
White Truffles $3600.00
Blue Fin Tuna $3603.00
Le Bonnotte Potatoes $270.81

Answers

Answer:

Explanation:

This is a project. This is not Brainly material. Just sink your teeth into it and do your best. I definitely would not rely on some stranger on the Internet to give me a good program to turn in for this project anyway. Just start coding and you'll be done before you know it.

While all pages use HTML code, not all pages are written in

Answers

Is this a question?

*Answer: not much information to answer with*

Answer:

Code Form

Explanation:

What type of information is best suited for infographies?​

Answers

Answer:

All varieties of information, from bullet pointed text to numerical tables

Explanation:

Answer:

All varieties of information, from bullet pointed text to numerical tables

Explanation:

what is the economic and ideological causes of the American, the French,and the Chinese revolutions, and to see the larger historical contexts in which these events took place?​

Answers

Answer:

Explanation:The French who had direct contact with the Americans were able to successfully implement Enlightenment ideas into a new political system. The National Assembly in France even used the American Declaration of Independence as a model when drafting the Declaration of the Rights of Man and the Citizen in 1789.

User defined blocks of code can be created in
Snap using the
feature.
A. make a block
B. duplicate
C. create
D. define a function

Answers

D....................

If you are insured with third party insurance, it will cover which costs?

A. business losses due to a denial-of-service attack
B. loss of data in your laptop because of a coffee spillover
C. ransomware attack on your laptop
D. costs related to lawsuits, and penalties due to a cyberattack

Answers

Answer:

c.

Explanation:

Answer: D (costs related to lawsuits, and penalties due to a cyberattack)

Explanation: Third Party insurance covers the liabilities of policyholders to their clients or customers. Regulatory: It covers the cost related to legal affairs, lawsuits and penalties due to a cyberattack.  

A slide contains three text boxes and three images that correspond to the text boxes. Which option can you use to display a text box with its
image, one after the other, in a timed sequence?
A. transition
В. table
C. animation
D. slide master
E. template

Answers

The answer is A. Transition.

Answer:

animation

Explanation:

6
Suppose the following formula is inputted into Excel:
=MROUND(1/4,100)
The output in the cell will be:
0
0.25
0.2500
1

Answers

Answer:

the output in the cell will be 0,2500

Write an instance method in Rational called add that takes a Rational number as an argument, adds it to this, and returns a new Rational object. There are several ways to add fractions. You can use any one you want, but you should make sure that the result of the operation is reduced so that the numerator and denominator have no common divisor (other than 1).

Answers

Answer:

Explanation:

I do not have the Rational class but based on the information provided, the following class has been tested and does what is requested. It can simply be added to the Rational class and it will work fine. Due to technical difficulties I had to add the instance method as an attachment in a text file down below.

What are input masks most useful for in data validation? moving data from one field to another hiding parts of a value that are unnecessary identifying duplicate values in different records in a table ensuring consistent formatting of values in a specific field

Answers

Answer:

Ensuring Consistent Formatting of Values in a Specific Field

Explanation:

Answer: ensuring consistent formatting of values in a specific field

Explanation: on edg

what is a . com in a web address mean

Answers

Answer:

dot commercial

Explanation:

.edu education

.gov goverment

Answer:

Commercial

Explanation:

You are going to visit a national park, and have never been there before. You are using a map to try and make the distance travelled as short as possible. There are 5 intermediate towns, A, B, C, D, and E, you may gln your way to the park, and the distances between the various locations are given below.

Answers

Answer:

eggs fishing didn't ysjffj

Suppose you observe that your home PC is responding very slowly to information requests from the net. And then you further observe that your network gateway shows high levels of network activity, even though you have closed your email client., Web browser, and other programs that access the net. What types of malware could cause these symptoms

Answers

ANSWER: BOT

EXPLANATION: When a PC is experiencing the listed effects, it thus depicts that the PC is under attack by a bot, which is a type of script or software application that establishes automated tasks via command.

However, a bad bots often initiate malicious tasks that gives room for attackers to take control over an affected PC remotely, most especially for fraudulent activities.

When several affected computers are connected, they form a botnet connection.

jettison folk 2007, Magnum opus, be moving, offers poisoned commentary on the film industry.

Answers

Answer:

I'm a little confused...

Explanation:

Can you reword this please?

What is the proper order for the fetch-execute cycle?

Answers

Control Unit – controls all parts of the computer system. It manages the four basic operations of the Fetch Execute Cycle as follows:

Fetch – gets the next program command from the computer’s memory

Decode – deciphers what the program is telling the computer to do

Execute – carries out the requested action

Store – saves the results to a Register or Memory

Arithmetic Logic Unit (ALU) – performs arithmetic and logical operations

Register – saves the most frequently used instructions and data

Which examples demonstrate common qualifications for Marketing Information Management and Research careers? Check all that apply.

David has the physical strength to lift products on high shelves.
Alessandra analyzes and interprets information she gathered from surveys.
Eve is good at presenting and explaining information to others.
Franklin is a strong leader who is able to motivate others.
Gene is very organized and tracks information accurately and carefully.
Claire is confident and persuasive, which makes her good at selling products.

Answers

Answer:

2,3,5

Explanation:

Answer: the answer is 2 3 and 5

Explanation:

A user has a computer with a single SSD, and the entire drive contains one partition. The user wants to install a second OS on the computer without having to reinstall the current OS. The user wants to be able to select which OS to use when booting the computer. Which Disk Management tools should the user utilize to accomplish this task?

Answers

Answer:

The correct approach is "Shrink partition". A further explanation is given below.

Explanation:

Shrinking partition shrinks or decreases this same disc size as well as unallotted disc space, unallotted space could be utilized to mount a secondary Operating system to operate as a double operating system.Whilst also diminishing everything into neighboring volatile memory on another disc, this same space required for area as well as drives could also be reduced.

Thus the above is the correct answer.

Which factor distinguishes IOT devices from standard computing devices such as laptops and smart phones?

Answers

Answer:

PLS help me I'm tried

Haa plsssssss

Me Completan Pliiiis

Answers

Answer:

its in Spanish most people cant read Spanish

Explanation:

What are
the rules for giving
variable name ?​

Answers

Answer:

Rules for naming variables:

- Variable names in Visual C++ can range from 1 to 255 characters. To make variable names portable to other environments stay within a 1 to 31 character range.

- All variable names must begin with a letter of the alphabet or an underscore ( _ ).  For beginning programmers, it may be easier to begin all variable names with a letter of the alphabet.

- After the first initial letter, variable names can also contain letters and numbers.  No spaces or special characters, however, are allowed.

- Uppercase characters are distinct from lowercase characters.  Using all uppercase letters is used primarily to identify constant variables.  

- You cannot use a C++ keyword (reserved word) as a variable name.

what is a software house​

Answers

Answer:  a company whose primary products are various forms of software, software technology, distribution, and software product development. They make up the software industry.

this should be the answer

hoped this helped

how do i work this out? does anyone do programming?

Answers

Answer : No sorry ..

Which option would allow you to watch an HD video, without delays in playback, on a computer with a Mac OS and a connection that has a lower bit rate? MPG QuickTime H.264 Flash Player

Answers

Answer:

H.264

Explanation:

A file type can be defined as the standard used to store digital data such as pictures, texts, videos, and audios. They all have unique file extension which determines the type of software program (application) to be used for opening a particular file and accessing its data e.g pictures (jpeg, png), texts (txt, docx, rtf), audios (mp3, acc), and videos (mp4, 3gp, avi, h.264, mkv).

Sometimes, computer users make the mistake of opening files with the wrong software application or program, this often leads to an error due to the incompatibility of the software application with the particular file.

H.265 is a high efficiency video codec (HEVC) and it's a standard video compression codec designed and developed to offer a better data compression, as an upgrade to the advanced video coding (AVC) standard.

Hence, the option or file extension (format) which would allow you to watch a high definition (HD) video, without delays in playback, on a computer with a Mac operating system (OS) and a connection that has a lower bit rate is the H.264 format.

Software as a Service (SaaS) allows users to
remotely access which of the following? Check all
of the boxes that apply.

software

data

applications

Answers

Answer:

Data software provides the best and most powerful software that allows you in the class

Answer:

software

data

applications

(all)

Explanation:

....................

Answers

Answer:

*

* *

* * *

* * * *

* * * * *

i did it i guess?

Other Questions
The sentence below is an example of aCarrying an umbrella, the dog walked beside his master. Assume the following . 1,000 shares are outstanding (no change during the year) Net income is $5,000 The company paid $500 in preferred dividends The company paid $600 in common dividends The average market price of their common stock is $60 for the year The company had 100 warrants (for one share each) outstanding for the entire year, exercisable at $50/share The company's diluted earnings per share is closest to: $4.55 $4.42 $4.83 HELP THIS IS DUE TODAY. A B C or D. The table shows the relationship of how many pounds of pecans are needed to make a certain number of pies:Number of Pies369Pounds of Pecans246Which graph below shows plots of equivalent ratios for this situation? A graph is drawn. The horizontal axis and vertical axis values are 0 to 70 in increments of 10. The horizontal axis label is Number of Pies, and the vertical axis label is Pounds of Pecans. Points are plotted on the ordered pairs 15, 10 and 30, 20 and 45, 30. A graph is drawn. The horizontal axis and vertical axis values are 0 to 70 in increments of 10. The horizontal axis label is Number of Pies, and the vertical axis label is Pounds of Pecans. Points are plotted on the ordered pairs 10, 15 and 20, 30 and 30, 45. A graph is drawn. The horizontal axis and vertical axis values are 0 to 70 in increments of 10. The horizontal axis label is Number of Pies, and the vertical axis label is Pounds of Pecans. Points are plotted on the ordered pairs 15, 10 and 25, 10 and 35, 10. A graph is drawn. The horizontal axis and vertical axis values are 0 to 70 in increments of 10. The horizontal axis label is Number of Pies, and the vertical axis label is Pounds of Pecans. Points are plotted on the ordered pairs 10, 30, and 20, 20 and 30, 10. Currently, on average, people live 5 years after they retire. Write 9020000 in standard form? 1. Cuntas vocales tiene el abecedario en espaol? a. 10 b. 5 c. 262.Cierto o Falso La consonante [h] es considerada muda en el abecedario en ingls?3. Cules son las cuatro letras que no existen en el abecedario ingls? a. ch, ll, , rr b. c, z, ph, w c. c, k,ll,ch4. La vocal [u] pierde su sonido en cuatro combinaciones, nmbralas. a. que, qui b. gue, gui c. opcin a y b5. La combinacin de dos vocales dbiles se llama a. hitato b. diptongo c. tilde6. Qu consonante tiene el mismo sonido que la consonante [y]? a. i b. ll c. ch7. Cuntos sonidos tiene la vocal en espaol? a. 5 b. 1 c. 68. Cules son las consonantes que tienen el mismo nombre y sonido? a. b,c b. ll, y c. s,z9. Cierto o Falso La [ph] se usa en el espaol para producir el sonido de la [f]?10. Qu es lo que se usa para darle sonido a la [] dentro de ciertas palabras? a. acento b. tilde c. diresis11. Cmo se forma un diptongo?a. combinaciones de vocales debil con vocal fuerteb. combinacion de dos vocales fuertes12. Es posible que una palabra empiece con la [r]? a. s b. no13. Cules son las dos consonantes que tienen dos sonidos? a. b,c b. c,g c. ll, y A new sports car costs $40,000 and depreciates $3000 per year. Assuming that the rate of depreciation is constant, determine the following: (i) equation for the depreciation function.(ii) How much will the car be worth in 5 years? What is a globe?_______________ _____ of a corporation have the power to elect and remove directors at their annual meetings. Read the sentence from Peking Dust.I tell you, the Chinese have the style of the world, the rest of us are but imitatorsWhich word has the closest connotation to imitators as it is used in the sentence?O pretendersO trickstersO replicateso counterfeits The x = 68, y = 79, xy = 1200 x = 600 and N = 12 determine the equation of the least square line. Leave answer in 2 decimal places. What is the unit multipliers for seconds and minutes Question 1 Please explain briefly the characteristics and welfare effects of the three different types of price discriminations. Under which conditions are firms able to price discriminate? Why do fir List 2 organisms that are NOT plants that have the ability to do photosynthesis. What can you infer about tsunamis from their Japanese name Use pie= 22/7 to approximate the circumference of a circle whose diameter is 28 inches. While I do not expect, upon this occasion, or on any occasion, till after I get to Washington, to attempt any lengthy speech, I will only say that to the salvation of this Union there needs but one single thing the hearts of a people like yours. When the people rise in masses in behalf of the Union and the liberties of their country, truly may it be said, "the gates of hell shall not prevail against it." In all the trying positions in which I shall be placed, and doubtless I shall be placed in many trying ones, my reliance will be placed upon you and the people of the United States -Abraham Lincoln, 1861 Problem In the excerpt, what is Lincoln promoting that demonstrates his leadership abilities? Help is much needed. You will get lots of point too! Udo Inc., is a producer of office furniture, office equipment and warehouse products with customersin Europe, USA and Asia. The main market is Europe with the Nordic countries and Norway as thelargest single markets. In Norway, the turnover was approximately 440 million NOK in 2021. Movehas its head office, assembly plant and main warehouse in Norway, located in southern Norway. Themain warehouse is 53 000 square meters (25 000 sqm for assembly, and 28 000 sqm for warehouse).The number of employees in Norway is 40 (all working at the head office), while approximately 300employees are distributed between the different companies abroad (which together consist of 6foreign companies).They sell to different markets and buy stock products from China. The rest is sourced primarily fromlocal suppliers. In total, the supplier portfolio consists of 300-325 suppliers with 67% of supplierslocated in Europe, 10% in North Africa and 23% in Asia. Udo Inc., has 5 wholly-owned productionfacilities in Europe, with one by their main warehouse, incl. a receivement-hub in Europe and theypurchase from a wholesaler in Asia. Today it is cheaper to produce in Europe than in Asia becauselarge parts of the production are automated. Wage costs are now a much smaller part ofexpenditure than in the past.Products are sent to the assembly factory in southern Norway from the European receivement-hub.The products for Move are sold to wholesalers who in turn sell to retailers. All orders are thereforeentered by the wholesale customers via the order portal in the ERP system for Udo Inc., The ordersare processed at the head office in southern Norway, which plans the order processing, production,purchasing and transport for all the production plants, the receivement-hub, the assembly unit andthe main warehouse. Each plant has goods in stock. When the orders are ready, they are sent fromS.Norway to the wholesalers' main warehouse, where the goods are then stocked until thewholesalers receive orders from their customersQuestion : Illustrate the current supply chain of Udo Inc., and describe the main features. Find the values of the sine, cosine, and tangent for angle a