This is a technique used to break down (or partition) networks into subnets. The subnets are created through the use of subnet masks.

What will be an ideal response?

subnetting

Computer Science & Information Technology

You might also like to view...

In Access, there are several ________ methods to help minimize data entry errors into tables and forms

Fill in the blank(s) with correct word

Computer Science & Information Technology

When a new presentation is created from a template, the presentation is saved with a ________ file format

A) .thmx B) .potx C) .pptm D) .pptx

Computer Science & Information Technology