1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yawa3891 [41]
2 years ago
15

If you're connected to a switch and your NIC is in promiscuous mode, what traffic would you be able to capture

Computers and Technology
1 answer:
Yuri [45]2 years ago
8 0

If you're connected to a switch and your NIC is in promiscuous mode, the traffic would you be able to capture would be broadcast traffic.

<h3>What is Broadcast traffic?</h3>

Broadcast traffic is used to send packets to all hosts on the network using the network's broadcast address. With a broadcast, the packet contains a destination IP address that only has numbers one (1s) in the host portion. This means that all hosts on that local network (broadcast domain) will receive and verify the packet. Many network protocols, such as DHCP, use broadcasts. When a host receives a packet sent to the network's broadcast address, the host processes the packet as a packet addressed to its unicast address.

Also, there are two types of broadcasts: directed broadcast and limited broadcast.

See more about computing at: brainly.com/question/10873104

#SPJ1

You might be interested in
cellPhoneBill(m,tx)Write the function cellPhoneBill()that takes two int m and txas input and returns a float.The function takes
lidiya [134]

Answer:

The solution code is written in C++

  1. float cellPhone(int m, int tx){
  2.    float COST_PER_MIN = 0.1;
  3.    float COST_PER_MESSAGE = 0.2;
  4.    
  5.    float bill_amount = m * COST_PER_MIN + tx * COST_PER_MESSAGE;
  6.    
  7.    return bill_amount;
  8. }

Explanation:

Firstly, declare a function named cellPhone() that takes two input parameters, m and tx (Line 1).

Since the policy of the carrier company is not given in the question, I make a presumption that the cost per minutes is $0.10 and the cost per message is $0.20 (Line 2- 3).

Next, apply the formula m * COST_PER_MIN + tx * COST_PER_MESSAGE to calculate the total bill (Line 5) and return the bill_amount as function output (Line 7).

4 0
3 years ago
Which item can you add using the tag?
Svetllana [295]

Answer:

an image

Explanation:

good luck have a nice day

3 0
3 years ago
Read 2 more answers
How to make classs constructer java.
ladessa [460]

Answer:

A constructor doesn't have a return type.

The name of the constructor must be the same as the name of the class.

Unlike methods, constructors are not considered to be members of a class.  

A constructor is called when a new instance of an object is created.

Explanation:

4 0
3 years ago
Given the class 'ReadOnly' with the following behavior: A (protected) integer instance variable named 'val'. A constructor that
Dafna1 [17]

Answer:

I believe you want a subclass so here it is!

public class ReadWrite extends ReadOnly {

public ReadWrite(int initialValue){

super(initialValue);

}

private boolean modified = false;

public void setVal(int x) {

val = x;

modified = true;

}

public boolean isDirty() {

return modified;

}

}

Explanation:

I might be wrong, just check through it in case

Hope this helped

:)

7 0
3 years ago
Why could Mars not hold onto its atmosphere?
vazorg [7]

Answer:

Mars loses its atmosphere faster, because there's less gravity to hold on to it. It goes through the loss of atmosphere faster than earth does

Explanation:

3 0
3 years ago
Other questions:
  • Java and Python are considered rapid development programming languages?<br><br> True<br><br> False
    12·2 answers
  • Give a logical expression with variables p,q, and r that is true if p and q are false and r is true and is otherwise false.
    5·1 answer
  • Next, go to the mw_tour.html file. Within the document head, create links to the mw_layout.css and mw_styles.css style sheet fil
    10·1 answer
  • Three common risk factors for young drivers and how you plan to minimize these factors.
    13·1 answer
  • Which of the following is a key difference between a Windows 7 restore point and one you set yourself?
    11·1 answer
  • Draw a flowchart or write pseudocode to represent a program's logic that allows the user to enter a value. The program multiplie
    5·1 answer
  • 5. What is a domain name used for?​
    14·1 answer
  • Develop a stored procedure that will take a state abbreviation as a parameter and list the name of the state, vendor, and total
    9·1 answer
  • (1) Prompt the user to enter two words and a number, storing each into separate variables. Then, output those three values on a
    10·1 answer
  • Disadvantages of a grain crusher
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!