The activity of stealing (borrowing) bits from the host portion to further subdivide the network portion of an address is called ____________________.

Fill in the blank(s) with the appropriate word(s).

subnetting

Computer Science & Information Technology

You might also like to view...

If users experience a delay when editing complex worksheets, they can set calculations to update ________

A) automatically B) manually C) only when the file is saved D) only when the file is closing

Computer Science & Information Technology

When a user logs on to a Windows 7 computer using Remote Desktop, users that are logged on locally are unaffected.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology