Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In


Have an account? Sign In Now

Sign In

Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.

Sign Up Here


Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.


Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

Search infos

Search infos Logo Search infos Logo

Search infos Navigation

  • Home
  • About Us
  • Blog
  • Contact Us
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Terms of Use
  • Privacy Policy
Home/ Questions/Q 834
Next
In Process
Chloe
  • 0
ChloeTeacher
Asked: August 30, 20222022-08-30T17:07:42+00:00 2022-08-30T17:07:42+00:00In: Programming languages

which subnet mask would be used if 5 host bits are available?

  • 0

Hi,

I would ask about the subnet mask.

which subnet mask would be used if 5 host bits are available?

  • 4 4 Answers
  • 57 Views
  • 0 Followers
  • 0
Answer
Share
  • Facebook
  • Report

4 Answers

  • Voted
  • Oldest
  • Recent
  1. Gianna Pundit
    2022-08-30T17:09:41+00:00Added an answer on August 30, 2022 at 5:09 pm

    The subnet mask 255.255.255.0 has 8 host bits. The mask 255.255.255.128 provides 7 host bits. The mask of 255.255.255.224 has 5 host bits. Finally, 255.255.255.240 represents the 4 host bits.

    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report
  2. Camila Pundit
    2022-08-30T17:12:55+00:00Added an answer on August 30, 2022 at 5:12 pm

    The purpose of a subnet mask is to separate the portion of an IP address that contains location information from the portion that contains identity information.

    The answer is: 255.255. 255.224

    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report
  3. Scarlett Teacher
    2022-08-30T17:16:05+00:00Added an answer on August 30, 2022 at 5:16 pm

    The subnet mask is a 32-bit number constructed by setting the host bit to 0 and the network bit to 1. In this way, the subnet mask divides the IP address into a network address and a host address. Address “255” is always assigned to broadcast addresses and addresses “0” is always assigned to network addresses.

    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report
  4. johndoe Teacher
    2022-08-30T17:20:11+00:00Added an answer on August 30, 2022 at 5:20 pm

    You can use the windows search field to find the subnet mask. However, the subnet mask that would be used if 5 host bits are available is 255.255. 255.224

    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report

You must login to add an answer.


Forgot Password?

Need An Account, Sign Up Here

Sidebar

Ask A Question

Questions Categories

Certifications
65Questions
, 0Followers
General
38Questions
, 0Followers
Programming languages
13Questions
, 0Followers
Communication
9Questions
, 0Followers
Gifts
4Questions
, 0Followers
University
2Questions
, 0Followers
Company
1Question
, 0Followers
Softwares
1Question
, 0Followers
SEO
1Question
, 0Followers
Language
0Questions
, 0Followers
Management
0Questions
, 0Followers
Design
0Questions
, 0Followers
Games
0Questions
, 0Followers
  • Popular
  • Answers
  • johndoe

    how many Shrek movies are there

    • 6 Answers
  • Harper

    One piece swimsuit for men

    • 6 Answers
  • Scarlett

    What are two of the required steps to configure PAT? ...

    • 6 Answers
  • Philippe
    Philippe added an answer Thank you guys a lot for your help, feedback, and… September 19, 2022 at 3:05 pm
  • Aurora
    Aurora added an answer Hi, For me, it is not that kind of difficult… September 19, 2022 at 3:03 pm
  • Stella
    Stella added an answer Hi Phillipe, As far as i know, and referring to… September 19, 2022 at 2:59 pm

Related Questions

  • Which command would create a valid IPv6 default route?

    • 5 Answers
  • Which command will selectively display ipv6 routes that are learned ...

    • 4 Answers
  • At which layer of the OSI model would a logical ...

    • 5 Answers
  • Why would a technician enter the command copy startup-config running-config?

    • 4 Answers
  • Which address does a NIC use when deciding whether to ...

    • 5 Answers

Top Members

Gianna

Gianna

  • 5 Questions
  • 126 Points
Pundit
Emma

Emma

  • 8 Questions
  • 119 Points
Pundit
Philippe

Philippe

  • 5 Questions
  • 107 Points
Pundit

Trending Tags

altura bad bunny cameraman comfortable crocs easy french places public public toilet sanitation slippers slippers for women slippers unisex smiley face toilets towel traditional crocs trend crocs usa gear trueshot

Footer

Search infos

Searchinfos is an online space for exchanges on several topics between users.

About Us

  • About Us
  • Contact Us

Legal Stuff

  • Terms of Use
  • Privacy Policy

Articles

  • Blog

Follow

© Searchinfos. All Rights Reserved