What protocol is used to discover the hardware address of a node with a certain IP address?

Answers

Answer 1

Answer: ARP hope this helps


Related Questions

How many 60 KB jpeg files can be stored on a 2 MB folder in your hard drive?​

Answers

Answer:

2 MB = 2048 kb

2048 / 60 = 34.1

Explanation:

In Boolean Logic: FALSE AND TRUE

Answers

Answer: It's basically using operators to determine if the code (usually in an if statement) is true or false.

Advantages of communications​

Answers

Answer:

promotes team building

creates better relationship

Answer:

➨It is quick in obtaining feedback once delivered. ➨It provides complete understanding of communication delivered and there is chance to make it more clear in case of doubts in interpretation of words or ideas. ➨It is more reliable method of communication. ➨It is flexible and effective for all.

10 sentences about computer parts.

Answers

One computer part is the CPU, it’s a piece of hardware the last allows your computer to access and interact all the applications and programs. The first ever CPU chip was invented around 4 decades ago. The keyboard is another computer part and it allows the user to type letters and numbers. There are about 104 keys on a keyboard and there are different parts in it. Some of the parts include, control keys, function keys, navigation keys, numeric keypad, and so on. A mouse is another device used with the keyboard to position the cursor. It’s a hand held device that detects two-dimensional motion relative to a surface. This motion is typically translated Into the motion of a pointer on a display, which allows a smooth control of the graphical user. Memory is a device to store all of your information and saved data. The motherboard is the backbone that tied together the computers components at one spot.

SOME PLEASEE HELP!!
(has to be 4 paragraphs)

Answers

Answer:

Ahhh i wanna help so bad hold on

Explanation:

What is the purpose of a computer network needs assessment? to evaluate how to move from the current status to the desired goal to determine what steps employees can take to increase company revenue to analyze which workers need more training to improve their performance to compare worker productivity

Answers

Answer:

to evaluate how to move from the current status to the desired goal

Complete the following sentences by either filling in the blank or writing out the rest of the sentence (when there is a … ):

The internet is made up of _________ networks that all connect together to make a ____________ network.

The job of a router on the internet is to…


Clients allow people to…


Servers store _____________________ and send those to _____________ over the internet.


The internet is physically connected across the world using _______________


Computers break up information, like photos and emails, into ________________



The ___________ protocol tells computers how to break up the information and orders it.


The ________________ protocol tells the packets where they are going and where they are coming from.


The packets get to their destination by…


When the packets get to their destination, the __________ protocol…



Computers get the _______________ of servers by asking the ______________



Computers use the _____________ protocol to display a webpage.

Answers

Answer

hundreds,  massive, connect to the internet gigabytes, people, computers,

bytes, TCP/IP, TCP, internet, TCP, answers, questions, HTTP

Explanation:

Can I please get an answer, it's for computer science.

Answers

Answer:

I believe the answer would be B. C. and D.  A, wouldnt make sense, as GitHub doesn't have that as a feature. I hope this helps! :)

Answer:

ok im not 100% sure this is right but i also don't pay attention in any of my classes except music so i would maybe say options D,B, and A

Explanation:

Question
What protocol is used to discover the hardware address of a node with a certain IP address?

Answers

Answer:

ARP is a simple query–response packet protocol used to match workstations hardware addresses to IP addresses. In other words, ARP is the protocol used to identify nodes in a LAN. ARP is described in RFC 826

Give short introduction of profession and make a list of its types. ​

Answers

are you asking for a list of professional jobs or?…..

Write a program in c++ to input a number print the sum of all the odd factors.​

Answers

Answer:

#include <bits/stdc++.h>

using namespace std;

//calculate sum of odd factors

int sum(int n) {    

int res = 1;  

 while (n % 2 == 0)  

 n = n/ 2;    

for (int i = 3; i <= sqrt(n); i++)

{      

int count = 0, total = 1 ;  

    int temp = 1;    

  while (n % i == 0) {  

       count++;      

   n = n / i;        

 temp *= i;        

 total += temp;    

  }      

res = res*total;  

 }  

 if (n >= 2)

   res *= (1 + n);  

 return res;

}

int main()

{

   int n = 20;  

 cout<<"sum of odd factors is : ";  

 cout <<sum(n);    

return 0;

}

Section A - True or False
Question 4: You can use the formatting toolbar buttons to apply any type of formatting to the selected cell entry.

Answers

Answer:

False, Trust me

PLEASE GIVE ME BRAINLIEST

Explanation:

Why do we create user accounts to customize our preferences​

Answers

I feel like we should create our own account for

security purpuoses   it's a good idea for each user to have their own account. Everyone having their own account is better for security reasons. For instance no one can access anyone else's account without their password.

evolution of management​

Answers

Answer:

Evolution of Management and Evolution of Management Science. ... Evolution of the management thought is a process that began in the earlier days of humans. It began when the man found the need to live in the groups. Then, mighty men soon organized the masses and distributed them among the groups.

Explanation:

HOPE IT HELPS

Your answer → - Evolution of management thought is a process that began in the earlier days of humans. -

What are three advantages of using enterprise software in an organization?

A. It provides more security features that allow organizations to protect their data

B. It is available for use on both desktops and mobile devices.

C. It is an excellent platform for writing and revising personal memoirs.

D. It allows a large number of people to collaborate on a project.​

Answers

The three advantages of using enterprise software in an organization is that it provides more security features that allow organizations to protect their data.

The availability for use on desktops and mobile devices, which allows a large number of people to collaborate on a project, is also an advantage.

Therefore, using a enterprise software enables the integration of the strategy, enabling a more systematized management that is facilitated by the processing of data that supports decision-making.

Speed, collaboration and transparency are also improved, increasing the reliability and overall quality of organizational processes.

Learn more here:

https://brainly.com/question/1917506

How can you begin networking online? What’s step one?

Answers

Answer:

Step 1: Establish your digital presence by building out your profile. ...

Step 2: Find people to connect with by joining LinkedIn groups. ...

Step 3: Engage by posting content and talking to industry influencers. ...

Step 4: Repeat until you amass a strong following.

Explanation:

When you use a library in your code, how do you give attribution?

Answers

When you use a library in your code, you give attribution: by writing the source, title, author and license in your code.

Attribution can be defined as a process which typically involves the citation (reference) of an original source of information such as a library, quote, paraphrase or summary, especially by using the author's full name, source, and job title (position) as the case may be.

In software development, you give attribution when you use a library in your code by writing the following:

The source in your code.The title in your code.The author in your code.The license in your code.

Read more: https://brainly.com/question/21172316

A field name can be up to 64 characters long

Answers

Answer:

Explanation:

cool ..........................,...............................

Number 1 is what part of an application







Title Bar


Ribbon


Quick Access Toolbar


Status Bar

Answers

Answer:

The correct answer is Quick acces tool bar. You litteraly probably don't even use brainly anymore lol.

Explanation:

I absolutly confirm this is correct.

The number 1 is the part of an application that is considerably known as the Quick Access Toolbar. Thus, the correct option for this question is C.

What does the Quick Access toolbar contain 1 point?

The customizable Quick Access Toolbar contains a set of commands that are independent of the currently displayed tab on the ribbon. You can move the Quick Access Toolbar from one of the two possible locations, and you can add buttons that represent commands to the Quick Access Toolbar.

According to the context of this question, the quick access toolbar is located in the title bar of the application window but can be configured to display below the ribbon usually consisting of the number 1 part of an application.

Therefore, number 1 is the part of an application that is considerably known as the Quick Access Toolbar. Thus, the correct option for this question is C.

To earn more about Quick access toolbar, refer to the link:

https://brainly.com/question/13523749

#SPJ6

Design and implement an application that reads a string from the user then determines and prints how many of eachlowercase vowel (a,e,i,o,and u) appear in the entire string.

Answers

Design and implement an application that reads a string from the user, then determines and prints how many of each lowercase vowel (a, e, i, o, and u) appear in the entire string . Have a separate counter for each vowel. Also count and print the number of nonvowel characters .

SPECIFICATION OF PROMPTS, LABELS AND OUTPUT : Your code should use the prompt "enter string : ". After the input is read, there are six lines of output , each starting with a different label: "a: ", "e: ", "i: ", "o: ", "u: ", "other: " in that order. After each label is the required count.

For example: if "aardvark heebie jeebies" were read in,

Why did the spelling and grammar checkers in Word miss the errors highlighted in yellow?


please help, im vv confused

Answers

Answer:

I do believe that it is a grammar mistake.

what is a program or collection of programs that enable a person to manipulate a visual images on a computer​

Answers

In computer graphics, graphics software refers to a program or collection of programs that enable a person to manipulate images or models visually on a computer. ... In addition to static graphics, there are animation and video editing software.

ctivity 2: irections: Convert the given value to unit asked. 1. 1 tb 2. 500 mb 3. 200 kb 4. 1,000,000 bytes 5. 500 gb mb gb byte gb mb

help please​

Answers

Answer:elab

Explanation:

2.Is having the right tool imperative to successful completion of task at hand? ​

Answers

[tex]\huge\underline\mathtt\colorbox{cyan}{Yes}[/tex]

Having the right tool is imperative to successful completion of task at hand.

Write a method named removeDuplicates that accepts as a parameter a List of integers, and modifies it by removing any duplicates. Note that the elements of the list are not in any particular order, so the duplicates might not occur consecutively. You should retain the original relative order of the elements. Use a Set as auxiliary storage to help you solve this problem.

For example, if a list named list stores [4, 0, 2, 9, 4, 7, 2, 0, 0, 9, 6, 6], the call of removeDuplicates(list); should modify it to store [4, 0, 2, 9, 7, 6].

Answers

The method is an illustration of loops or iteration.

Loops are used to carry out repetitive operations.

The removeDuplicates method in Python is as follows, where comments are used to explain each line.

#This defines the method

def removeDuplicates(list):

#This initializes the output list

   outputList = []

#This iterates through the list

   for i in list:

#All elements not in the output list, are appended to the output list

       if i not in outputList:

           outputList.append(i)

#This returns the output list

   return str(outputList)

At the end of the method, the new list contains no duplicates.

Read more about similar program at:

https://brainly.com/question/6692366

24. Describe the role of keyboard and mouse in computer? What are the fundamental similarity and differences between them? ​

Answers

Answer: They give input

Explanation: The keyboard and the mouse controll the computer, by giving inputs. Similarity - They both give inputs

Difference - They give inputs in different ways

Which type of game is least likely to need a structured narrative?


a first-person shooter, ,

an adventure game ,

a role-playing game ,

a sports game







Question 4

Answers

Answer:

an adventure game

Explanation:

It is this because people explore more than rather have certain dialouge or storylines like perspective games. so in that case i hope this answer helps!!!

explain how communication managerial efficiency​

Answers

Answer:

The efficiency of manager depends upon his ability to communicate effectively with the members of his organisation. It is only through communication that management conveys its goals and desires, issues instructions and orders, allocates jobs and responsibility and evaluates performance of subordinates.

pls tag me brainliest

Which statement is true about the storage media?

Group of answer choices

Data transfer rate of the inner tracks of a magnetic disk is higher than that of outer tracks.

Cost per bit in SSD is lower than that of a Magnetic tapes.

Cache memory is much faster than Magnetic disk storage. But it is much expensive than magnetic disks.

Magnetic disk storage is faster than SSD storage and hence it is a good candidate for a database that needs faster access time.

Answers

The statement which is true about storage media is "Cache memory is much faster than Magnetic disk storage. But it is much expensive than magnetic disks."

The cache memory is faster than both SDDs and HDDs. In mathematical terms, it is 4 time faster than SSDs and 80 times faster than HDDs. Moreover, it is more expensive then the SSDs and HDDs storage. Practically speaking, it is not good to have as much in-memory storage as persistent block storage on SSDs or HDDs.

The remaining statements are incorrect such as "Cost per bit in SSDs is lower than that of a Magnetic tapes". While truth be told the SSD cost more than the Magnetic Tapes.

Magnetic disk storage is faster than SSD storage and hence it is a good candidate for a database that needs faster access time. The statement is also incorrect as SSD are much faster than Magnetic Disk Storage.

Learn more in: https://brainly.com/question/25026748

I just need question 2 answered. Someone please help I’m on a test!

Answers

Answer:

Principal photography

Explanation:

Other Questions
Why is knowledge and skills important in animal care and breeding? Explain in 3 to 5 sentences. What suggestion can you offer for the First Amendment Encyclopedia? cuando hay muchos coches en la calle al mismo tiempo, se producen Signing would most likely be used in which of the following scenarios?among Deaf family members who all live on an isolated islandO among a group of friends signing to each other afterschoolby an ASL teacher visiting the home of one of their studentsO by a Hard of Hearing person communicating with a Hearing person why did Parliament pass the Navigation Acts?HELPPPPP PLEASE THANK YOUUU The function f(x)= 3x + x2 + 2x rises as x grows very small. As x goes to negativeinfinity, f(x) goes to infinity.TrueFalse what is dividing fractions Pls help! A B C,or D 5.) Dynasti works in a department store selling clothes. She makes a guaranteed salary of$1250 per week and is paid a commission of 15% of her sales. Write an equation to model thesituationHow much money will Dynasti make if she sells $4,000 worth of clothing? to maximize economic surplus, keep increasing output as long as Complete the chart with the appropriate verb form 2) This excerpt is an example ofA)flashbackB) foreshadowingsettingD) symbolism why were west african kingdoms like ghana and mali successful during the post-classical period? Look at the passage below, and then answer the question that follows. and by virtue hereof to enact, constitute and frame such just and equal Laws, as shall be thought most meet and convenient for the general good of the Colony, unto which we promise all due submission and obedience.Mayflower CompactChoose the right word to complete the sentence.According to the passage, the laws made in the colony were for the benefit of . what is the product of 1/2 and 3/5 ? A number n decreased by 8 is 19 What is milie like?A.) nervousB.) patientC.) boringD.) happy Look at the numbered locations. Our solar system can be found at_____Location 1Location 2Location 3Location 4 Describe the necessary steps from observing a specimen with 4X objective lens to observing the same specimen with 100X objective lens under the light microscope. Question 20Figure A is doubled in size then reflected across the x-axis creating Figure B.How will the coordinates of Figure B differ from Figure A as a result of this series of transformations?two times the x-value and two times the opposite y-valueB the opposite x-value and two times the y-valuetwo times the x-value and two times y-valueDtwo times the opposite x-value and the opposite y-value