This is a technique used to break down (or partition) networks into subnets. The subnets are created through the use of subnet masks.
What will be an ideal response?
subnetting
Computer Science & Information Technology
You might also like to view...
In Access, there are several ________ methods to help minimize data entry errors into tables and forms
Fill in the blank(s) with correct word
Computer Science & Information Technology
When a new presentation is created from a template, the presentation is saved with a ________ file format
A) .thmx B) .potx C) .pptm D) .pptx
Computer Science & Information Technology