Question

Question 30 Given 5 bits of mask for the host portion of an IP address, how...

Question 30

Given 5 bits of mask for the host portion of an IP address, how may usable host addresses are available?

32
62
28
30
14
29
22
31

Question 21

Which client accesses the Web server by using a GET MESSAGE?

SMTP
HTTP
FTP
HTML
IMAP
DHCP

Question 16

Which underlying protocol does the IP networking ping command use?

HTTP
ARP
IMCP
TCP
ICMP
MAC

Question 8

The operating system runs in the ______ mode.

Kernel
Stealth
Shell
User
Operating
0 0
Add a comment Improve this question Transcribed image text
Answer #1
30) 30
21) HTTP
16) ICMP
8)  Kernel

Add a comment
Know the answer?
Add Answer to:
Question 30 Given 5 bits of mask for the host portion of an IP address, how...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Six Which of the following options can be used to configure TCP/IP? (Choose all that apply.)...

    Six Which of the following options can be used to configure TCP/IP? (Choose all that apply.) APIPA DHCP DNS Static IP addressing You need to install a new Windows 10 machine into Site A with a subnet mask of 255.255.255.224. Which TCP/IP address can you assign to the new Windows 10 machine as a valid host address? 192.168.2.63 Which subnet mask would you utilize if you had a class C network and you wanted to connect 23 branch offices back...

  • on calculations can i see how did the expect come to the solution ,all the workout...

    on calculations can i see how did the expect come to the solution ,all the workout should be included QUESTION 1 A file of size F = 8 Gbits needs to be distributed to10 peers. Suppose the server has an upload rate of u = 68 Mbps, and that the 10 peers have upload rates of: u1 = 20 Mbps, u2 = 22 Mbps, u3 = 12 Mbps, u4 = 19 Mbps, u5 = 25 Mbps, u6 = 24 Mbps,...

  • 166 Chapter 8: TCP/IP Applications Getting Down to Business The way network communication all those ls...

    166 Chapter 8: TCP/IP Applications Getting Down to Business The way network communication all those ls and Os) goes in and out of a machine physically is through the NIC (network interface card). The way network communication goes in and out of a machine logically though, is through a program or service. A service is a program that runs in the background, independent of a logon, that provides functionalities to a system. Windows client machines, for instance, have a Workstation...

  • Question: Your Answer: What is the IP Address of the computer? If this computer could reach...

    Question: Your Answer: What is the IP Address of the computer? If this computer could reach the Internet but could not resolve names on the Internet, assuming that these settings are correct, which computer would you check to make sure it is running? What is the fully qualified domain name for this computer? What is the MAC address of this Network Adapter? What is the IP address of the device that provided the computer IP Address? What is the CIDR...

  • (1) Computer hosts usually have two addresses, an Internet Protocol (IP) address and an Ethernet Media...

    (1) Computer hosts usually have two addresses, an Internet Protocol (IP) address and an Ethernet Media Access Control (MAC) address. For the benefit of humans, the IP address is normally represented as a dotted decimal notation, such as 192.168.10.2. Each of the decimal octets in the address or a mask can be converted to 8 binary bits. Remember that the computer only understands binary bits. If all 4 octets were converted to binary, how many bits would there be? (2)...

  • Question 26 (1 point) In Lab 1 (Exploring Encryption), what did you need to configure on...

    Question 26 (1 point) In Lab 1 (Exploring Encryption), what did you need to configure on the server or on the client? Question 26 options: Only (a) and (b) (c) The client's public key (a), (b), and (c) (a) The server's certificate (b) Enable TLS on the server Save Question 27 (1 point) The following question is Lab 2 related (Ports and Firewalls). At what point does the HTTP daemon service actively begin listening for traffic on the network? Question...

  • HOMEWORK 4

    Each (1-13) question is 5 points: 1.      How many bits are in a MAC address?2.       3.      How many bits are in an IPv4 IP address? 4.      When using DSL modem to connect to the Internet, the data transmission shares the cabling with what other technology? 5.      Which type of networking cable is more reliable, STP or UTP? Which is used more on LANs? 6.      Which TCP/IP protocol that manages packet delivery guarantees that delivery? Which protocol does not guarantee delivery, but is faster? 7.      Which...

  • check my answers for Networking I came up with these answers, can check my answers Question...

    check my answers for Networking I came up with these answers, can check my answers Question 1: General What data rate is needed to transmit an uncompressed 4" x 6" photograph every second with a resolution of 1200 dots per inch and 24 bits per dot (pixel)? 691,200 kb/s 28.8 kb/s 8.29 Mb/s 829 Mb/s Question 2: Layering "Layering" is commonly used in computer networks because (check all that apply): -It forces all network software to be written in ‘C’....

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT