1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aliun [14]
2 years ago
11

Refer to the exhibit. Host B on subnet Teachers transmits a packet to host D on subnet Students. Which Layer 2 and Layer 3 addre

sses are contained in the PDUs that are transmitted from host B to the router
Computers and Technology
1 answer:
Pachacha [2.7K]2 years ago
4 0

The layer are:

  • Layer 2 destination address = 00-00-0c-94-36-ab
  • Layer 2 source address = 00-00-0c-94-36-bb
  • Layer 3 destination address = 172.16.20.200
  • Layer 3 source address = 172.16.10.200

<h3>What is Destination Address? </h3>

This address  is known to be the  the address where the frame or packet of data is known to be sent to over a network. The destination address is said to be used by hosts on the network to know  if the packet or frame is intended for that host or not.

Note that the Layer 2 and Layer 3 addresses that are contained in the PDUs that are transmitted from host B to the router are:

  • Layer 2 destination address = 00-00-0c-94-36-ab
  • Layer 2 source address = 00-00-0c-94-36-bb
  • Layer 3 destination address = 172.16.20.200
  • Layer 3 source address = 172.16.10.20

Learn more about router from

brainly.com/question/24812743

#SPJ1

You might be interested in
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
Define a function begins_with_line that consumes a string and returns a boolean indicating whether the string begins with a dash
Ksju [112]

Answer:

The program written in python is as follows:

def begins_with_line(userinut):

     while userinut[0] == '-' or userinut[0] == '_':

           print(bool(True))

           break;

     else:

           print(bool(not True))

userinput = input("Enter a string: ")

begins_with_line(userinput)

Explanation:

The program makes use of no comments; However, the line by line explanation is as follows

This line defines the function begins_with_line with parameter userinut

def begins_with_line(userinut):

The following italicized lines checks if the first character of user input is dash (-) or underscore ( _)

<em>      while userinut[0] == '-' or userinut[0] == '_': </em>

<em>            print(bool(True))  </em><em>->The function returns True</em>

<em>            break; </em>

<em>However, the following italicized lines is executed if the first character of user input is neither dash (-) nor underscore ( _)</em>

<em>      else: </em>

<em>            print(bool(not True))  </em><em>-> This returns false</em>

The main starts here

The first line prompts user for input

userinput = input("Enter a string: ")

The next line calls the defined function

begins_with_line(userinput)

<u><em>NB: The program does not make use of if statement</em></u>

8 0
3 years ago
A student has a ten-year-old desktop computer that she only uses for word processing, but she would like to start using it to pl
wariber [46]

Answer:

She should buy a new one or buy a Gaming PC to upgrade the setup.

Explanation:

6 0
3 years ago
You invested $2,300 in a stock. Your account now has a value of $2,643. Your percentage gain on the investment (rounded to the n
nasty-shy [4]
Your percentage gain on the investment was d)15%

To find percentage increase we subtract original number from new number.
2,643 - 2,300 = 343
Then we divide 343 by 2,300 = .1491
Then you multiply by 100. 
.1491 * 100 = 14.91
It is a 14.91% (rounded) increase.
So the nearest percent out of these options would be 15%.

Hope this helps you! (:
-Hamilton1757
4 0
4 years ago
Read 2 more answers
Try drawing the bass clef sign by tracing over the dotted lines. then draw five more on your own
Jobisdone [24]

Answer:

ok

Explanation:

did it. It was a little difficult to keep my pencil straight.

6 0
3 years ago
Other questions:
  • CAPTCHAs can be used as a form of signature to create a valid contract in e-commerce. True False
    6·2 answers
  • which internet technology allows businesses to make presentation and share visual aids such as charts and graphs
    14·2 answers
  • A function ________ contains the statements that make up the function.
    5·1 answer
  • what program searches the Internet for specified keywords and returns a list of the pages where the keywords were found
    6·1 answer
  • Which expression is equivalent to 3x + 3x + 3x?<br><br> From Performance Matters
    11·2 answers
  • Consider the following class, which models a bank account. The deposit method is intended to update the account balance by a giv
    8·1 answer
  • What is operating system​
    10·2 answers
  • You are creating a program that can add up the amount of money the user spent that day. Right down to the penny! What kind of va
    12·2 answers
  • What year does futurist ray kurzweil believe ai will meet human intelligence?.
    11·1 answer
  • create a list of numbers 0 through 40 and assign this list to the variable numbers. then, accumulate the total of the list’s val
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!