Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
Donate
Ask a Question
Duplicate: Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid: 1. 131.107.256.80 2. 0.127.4.100 3. 222.222.255.222 4. 190.7.2.0 5. 127.1.1.1 6. 255.255.255.255 7. 198.121.254.255
–1
vote
1.8k
views
asked
Nov 25, 2020
in
Computer Networks
by
anonymous
Your answer
Help us make this a great place for discussion by always working to provide accurate answers.
Email me at this address if my answer is selected or commented on:
Email me if my answer is selected or commented on
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
Write 2 in words
To avoid this verification in future, please
log in
or
register
.
1
Answer
0
votes
answered
Nov 25, 2020
by
(user.guest)
Duplicate question. Already answered here >
https://cpentalk.com/2343/circle-portion-address-would-invalid-assigned-explain-invalid
Your comment on this answer:
Improve the existing answer with your comment.
Email me at this address if a comment is added after mine:
Email me if a comment is added after mine
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
To avoid this verification in future, please
log in
or
register
.
Related questions
–1
vote
1
answer
507
views
Duplicate: Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid: 131.107.256.80
asked
Nov 24, 2020
in
Computer Networks
by
anonymous
–1
vote
1
answer
797
views
Duplicate: Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid:
asked
Nov 24, 2020
in
Computer Networks
by
anonymous
+1
vote
1
answer
2.8k
views
Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid
asked
Nov 22, 2020
in
Computer Networks
by
anonymous
–1
vote
1
answer
1.4k
views
Duplicate: Determine the correct class of the following IP addresses: Address Class? 191.107.2.10 172.16.16.15 200.200.5.2 3.3.57.0 131.107.2.89 b) Which address class(es) in above table will allow you to have more than 1000 hosts per network?
asked
Nov 27, 2020
in
Computer Networks
by
anonymous
+2
votes
1
answer
1.9k
views
Find the net ID and host ID of the following IP Addresses? I. 114.34.2.8 II. 19.34.21.5 III. 23.67.12.1 IV. 127.23.4.0 V. 192.34.5.1
asked
Jul 13, 2021
in
Computer Networks
by
anonymous
–1
vote
1
answer
1.4k
views
Duplicate: How might you use a model of a system that already exists? Explain why it is not always necessary for such a system model to be complete and correct. Would the same be true if you were developing a model of a new system?
asked
Feb 9, 2021
in
Software Engineering
by
anonymous
0
votes
0
answers
1.1k
views
What are the propagation time and the transmission time for a 5-Mbyte message (an image) if the bandwidth of the network is 1 Mbps? Assume that the distance between the sender and the receiver is 12,000 km and that light travels at 2.4 x 108 m/s.
asked
May 7, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
2.7k
views
Suppose that the roundtrip delay between sender and receiver is constant and known to the sender. Would a timer still be necessary in protocol rdt 3.0, assuming that packets can be lost? Explain.
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
1.5k
views
An address space uses three symbols: 0, 1, and 2 to represent addresses. If each address is made of 10 symbols, how many addresses are available in this system?
asked
Jul 3, 2020
in
Computer Networks
by
anonymous
0
votes
0
answers
107
views
If C2 = 3, D7 = 15, E1 = 7, and F2 = 5, what would be the output of the Microsoft excel function below?
asked
Nov 8, 2021
in
Computational Tools
by
(user.guest)
+2
votes
1
answer
377
views
Signals will be exchanged between at the___________ of the TCP/IP Model? 1- network layer 2-data link layer 3-physical layer 4-application laye
asked
Jul 14, 2021
in
Computer Networks
by
anonymous
+5
votes
1
answer
631
views
If the size of the memory is 2GB and block size is 4 Bytes, then which cache line is supposedly be holding the memory block with number "256" if cache supports Direct Mapping.
asked
Aug 4, 2020
in
Computer Architecture
by
anonymous
+1
vote
0
answers
290
views
How to design a 4-input (A,B,C,D) digital circuit that will give its output a logic 1 only if the binary number formed at the input is between 2 and 9 (2&9 inclusive)?
asked
Nov 11, 2021
in
Hardware Systems & Electronics
by
anonymous
+1
vote
1
answer
332
views
A probability function is given by p(0) = 0.3164, p(1) = 0.4219, p(2) = 0.2109, p(3) = 0.0469, and p(4) = 0.0039. Find its mean and variance.
asked
Aug 30, 2021
in
Maths & Statistics
by
anonymous
+1
vote
1
answer
93
views
Identify the netid and hostid of the IP Address given its subnet mask in binary. Show your solution. 192.168.15.187 255.255.255.0
asked
May 6
in
Computer Networks
by
anonymous
0
votes
0
answers
359
views
Read the narrative that follows and use it to answer question 5.1 and 5.2. 5.1 Identify all the relationships/business rules. (12) 5.2 Draw a domain class diagram.
asked
Jun 6, 2021
in
Software Engineering
by
anonymous
+1
vote
1
answer
1.3k
views
If a physical address is 48 bits (6 bytes) what is the minimum header size at the data link layer of the TCP/IP protocol suite?
asked
Jul 2, 2020
in
Computer Networks
by
anonymous
0
votes
1
answer
1.9k
views
What does it mean for a wireless network to be operating in “infrastructure mode?” If the network is not in infrastructure mode, what mode of operation is it in, and what is the difference between that mode of operation and infrastructure mode?
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
395
views
Consider you have 10 data packet from 0 to 9. In Go-back-N and Selective repeat both have window size of 5. While transferring packet, ACK2 is lost. What will happened then? Show the scenario with proper figure.
asked
Apr 19, 2021
in
Computer Networks
by
anonymous
0
votes
0
answers
396
views
ys are constant and which are variable? 4 Describe what is Web caching and how it can reduce the delay in receiving a requested object. Will Web caching reduce the delay for all objects requested 2 by a user or for only some of the objects? Why?
asked
Apr 8, 2021
in
Computer Networks
by
anonymous
+1
vote
1
answer
669
views
Suppose a book-shelf has 6 mathematics texts, 3 physics texts, 4 chemistry texts, and 5 computer science texts. Find the number n of ways a student can choose: a) one of the texts. b) one of each type of text.
asked
Dec 29, 2020
in
Maths & Statistics
by
anonymous
0
votes
0
answers
391
views
Consider the simple signal processing system shown in Fig. P1.ll. The sampling periods of the AID and DIA converters are 7 = 5 ms and 7' = 1 ms, respectively. Determine the output y,,(r) of the system. if the input is
asked
Dec 15, 2020
in
Hardware Systems & Electronics
by
anonymous
0
votes
1
answer
230
views
Given a total bandwidth for cellular operator as 12.5 MHz. If each voice channel needs a bandwidth of 30 kHz, what is the total number of simplex channels per cluster and per cell in a 7-cell cluster?
asked
Nov 29, 2021
in
Computer Networks
by
(user.guest)
0
votes
1
answer
689
views
find out the number of networks, network of, first host, last host, and broadcast id of each network of this IP Address:192.168.10.0/28
asked
Dec 10, 2020
in
Computer Networks
by
anonymous
0
votes
1
answer
1.3k
views
Consider two mobile nodes in a foreign network having a foreign agent. Is it possible for the two mobile nodes to use the same care-of address in mobile IP? Explain your answer.
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
384
views
Suppose you wish to prove that the following is true for all positive integers nby using the Principle of Mathematical Induction: 1 + 3 + 5 + ... + (2n -1) =n2(a) Write P(1)
asked
Dec 22, 2020
in
Maths & Statistics
by
anonymous
0
votes
1
answer
2.0k
views
If all the links in the Internet were to provide reliable delivery service, would the TCP reliable delivery service be redundant? Why or why not
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
2.6k
views
True or false: When a BGP router receives an advertised path from its neighbor, it must add its own identity to the received path and then send that new path on to all of its neighbors. Explain.
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
411
views
Compute the total delay involved for a packet of size 1000 bytes to propagate over a link of distance 3000 km, propagation speed 3.0 x 108 m/s and transmission rate 2 Mbps.
asked
May 7, 2021
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
941
views
Two events A and B are such that P(A) = 0.5, P(B) = 0.3 and P(A ∩ B) = 0.1. Calculate
asked
Sep 20, 2021
in
Maths & Statistics
by
anonymous
0
votes
1
answer
5.5k
views
What is the 32-bit binary equivalent of the IP address 223.1.3.27?
asked
Oct 6, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
491
views
Explain why it is important to model the context of a system that is being developed. Give two examples of possible errors that could arise if software engineers do not understand the system context.
asked
Feb 9, 2021
in
Software Engineering
by
anonymous
+2
votes
1
answer
7.5k
views
Explain why it is important to model the context of a system that is being developed. Give two examples of possible errors that could arise if software engineers do not understand the system context.
asked
Nov 1, 2019
in
Software Engineering
by
anonymous
+4
votes
1
answer
7.0k
views
How might you use a model of a system that already exists? Explain why it is not always necessary for such a system model to be complete and correct.
asked
Nov 1, 2019
in
Software Engineering
by
anonymous
0
votes
0
answers
145
views
If a patient is known to be allergic to any particular medication, then prescription of that medication shall result in a warning message being issued to the system user.
asked
Dec 30, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
600
views
Assume an arbitrary number system having a radix of 5 and 0, 1, 2, L and M as its independent digits. Determine:
asked
Oct 12, 2021
in
Hardware Systems & Electronics
by
anonymous
0
votes
1
answer
203
views
A network on the Internet has a subnet mask of 255.255.240.0. What is the maximum number of hosts it can handle ?
asked
May 3
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
5.6k
views
Classify the following signals according to whether they are (1) one- or multi-dimen-sional; (2) single or multichannel, (3) continuous time or discrete time, and (4) analog or digital (in amplitude)
asked
Oct 1, 2019
in
Hardware Systems & Electronics
by
anonymous
0
votes
1
answer
2.0k
views
Suppose the IEEE 802.11 RTS and CTS frames were as long as the standard DATA and ACK frames. Would there be any advantage to using the CTS and RTS frames? Why or why not
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
237
views
A bag contains 5 red and 4 blue identical balls, if two are selected at random, one after the other, with replacement, find the probability that the first ball is red and the second is blue
asked
Dec 5, 2021
in
Maths & Statistics
by
(user.guest)
+1
vote
1
answer
1.2k
views
How much time would a program of ten thousand cycles be completed if it were run on a A/RISC B/ CISC...
asked
Aug 23, 2019
in
Computer Architecture
by
anonymous
+1
vote
1
answer
8.8k
views
Consider the GBN protocol with a sender window size of 4 and a sequence number range of 1,024. Suppose that at time t, the next in-order packet that the receiver is expecting has a sequence number of k
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
209
views
In TCP Header format if a device wants to send 8 bytes of data. Is it valid or not? Explain why
asked
Oct 1, 2020
in
Computer Networks
by
anonymous
+1
vote
0
answers
422
views
Compare and contrast three (3) performance assessment methods that could be used in evaluating the performance of computers. In each case demonstrate how it could be used to evaluate the performance of a set of computers.
asked
Jul 28, 2020
in
Computer Architecture
by
anonymous
+2
votes
1
answer
8.8k
views
Host Aand B are directly connected with a 100 Mbps link. There is one TCP connection between the two hosts, and Host A is sending to Host B an enormous file over this connection.
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
1.1k
views
Explain what is meant by “inversion of control” in application frameworks. Explain why this approach could cause problems if you integrated two separate systems that were originally created using the same application framework.
asked
Nov 10, 2019
in
Software Engineering
by
anonymous
+1
vote
0
answers
283
views
What could be the reason why the application of the 5 rules of transformation from Entity-Relation to Relation would not produce a collection of relations in 3rd Normal Form. Back your proposal with examples.
asked
Nov 8, 2021
in
Database Management Systems
by
anonymous
+1
vote
1
answer
9.0k
views
Suppose that a Web server runs in Host C on port 80. Suppose this Web server uses persistent connections, and is currently receiving requests from two different Hosts, A and B.
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
3.0k
views
Explain why it may be difficult to use agile methods in a large project to develop a new information system that is to be part of an organizational system of systems.
asked
Oct 31, 2019
in
Software Engineering
by
anonymous
+2
votes
1
answer
180
views
Suppose X is N(−1, 4). Find (a) P(X < 0); (b) P(X > 1); (c) P(−2 < X < 3); (d) P(|X + 1| < 1)?
asked
Aug 30, 2021
in
Maths & Statistics
by
anonymous
Welcome to
CPEN
Talk
.com
Solution-oriented students of
computer engineering
on one platform to get you that
ONE SOLUTION
...