1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Travka [436]
3 years ago
10

What type of traffic always goes to all devices in a subnet?

Computers and Technology
1 answer:
zmey [24]3 years ago
6 0
There are three types of traffic in an IP network:
1. Unicast -  one-to-one traffic (traffic from one sender to one receiver) 
2. Multicast - one to many traffic (one sender and more receivers) 
3.Broadcast -  every device in the network will receive the packet
So, the broadcast traffic <span>always goes to all devices in a subnet. </span>
You might be interested in
Together with some anthropologists, you’re studying a sparsely populated region of a rainforest, where 50 farmers live along a 5
Varvara68 [4.7K]

Answer:

Explanation:

Farmers are always both directly and indirectly connected to each other

Their network is mostly strong

Networks become weak only on the edges (ends) of the river but doesn't completely dimnish

With the available network length, the center of river bank forms the strongest network of all and becomes a key player in defining the balance property of overall network

The network is very well structurally balanced and we can see that through the below image

20 miles 10 20 30 40 50

See attachment file for diagram

Considering the total length of river as 50miles and and the center of the whole length will be at 25th mile. From that point, if we consider a farmer will be be having friends for a length of 20miles both along upstream and downstream.

By this he'll be in friend with people who are around 80% of the total population. As me move from this point the integrity increases and this results in a highly balanced structural network.

6 0
3 years ago
Write the definition of a function named printpoweroftwostars that receives a non-negative integer n and prints a line consistin
Aleksandr-060686 [28]
To accomplish this without using a loop,
we can use math on a string.

Example:
print("apple" * 8)

Output:
appleappleappleappleappleappleappleapple

In this example,
the multiplication by 8 actually creates 8 copies of the string.

So that's the type of logic we want to apply to our problem.

<span>def powersOfTwo(number):
if number >= 0:
return print("*" * 2**number)
else:
<span>return

Hmm I can't make indentations in this box,
so it's doesn't format correctly.
Hopefully you get the idea though.

We're taking the string containing an asterisk and copying it 2^(number) times.

Beyond that you will need to call the function below.
Test it with some different values.

powersOfTwo(4) should print 2^4 asterisks: ****************</span></span>
4 0
4 years ago
How to clear cache in Internet Explorer Version 11
Paladinen [302]
Clear the browser history and accept everything
7 0
4 years ago
Read 2 more answers
Assume that source elements of length k are mapped in some uniform fashion into a target elements of length p. If each digit can
lukranit [14]

Answer And explanation

a)

r^k has 1/r^k probability guess the correct source

b)

Each element in r^p  is mapped by r^k / r^p . There are r^k^-^p  So there are  r^k^-^p -1 elements.

number of target elements = r^k^-^p

number of source elements = r^k^-^p -1

probability = r^k^-^p -1 /r^k

c) Probability of the correct target element

1/r^p

6 0
3 years ago
Which of the following is the definition of red team?
marysya [2.9K]

Answer:

a. An open source port scanning and host detection utility. In a penetration test, this consists of penetration testers who have been given some background knowledge of the infrastructure.

Explanation:

b. Red team is special for checking to penetration test and there is no defend

c. They are not aware that penetration test is happening

d. The process is to check system security infrastructure by trying different types of penetration in unexpected ways.

a. <em>There is a special team created as called Red Team that they try to penetrate to the system with different methods. This test is longer and different then normal tests to detect is a system giving an alert for any action damaging to the system.</em>

3 0
3 years ago
Other questions:
  • You are given a network of 10.50.24.0/21, which contains 2,048 addresses. what subnet mask should you use to divide this into fo
    7·1 answer
  • The organization of logistics activities within a firm depends on a number of factors, including the number and location of cust
    10·1 answer
  • An essential skill today is knowing how to cite sources properly. Creative Commons has a system of licenses and tools for creato
    11·1 answer
  • A computer _________ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate exec
    9·1 answer
  • Create a security management policy that addresses the management and the separation of duties throughout the seven domains of a
    6·1 answer
  • In risk management what does risk evaluation involved
    14·1 answer
  • Computers are used to store, retrieve, and _____ data. manipulate mechanize memorize operate
    12·1 answer
  • Which function does the Subtotal feature use?
    5·1 answer
  • Which of the following is true about strings?
    15·1 answer
  • Which of these tools can best be used as a self assessment for career planning purposes?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!