1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SIZIF [17.4K]
3 years ago
14

A. experiment by purposely misconfiguring the gateway address on pc-a to 10.0.0.1. what happens when you try and ping from pc-b

to pc-a? do you receive a reply?
Computers and Technology
1 answer:
MrRa [10]3 years ago
7 0
Yes you will mate, hope this helps!
You might be interested in
What is an example of a reputable website
Keith_Richards [23]
A reputable website would be one that you could research online and read about it's history , reviews etc .
4 0
3 years ago
Read 2 more answers
Any thoughts to the answer
zhenek [66]
Cools the engine oil, thsts what I think, but not sure bc u would cool the engine, and it's a fan
4 0
3 years ago
Read 2 more answers
How is a non-disclosure agreement an important tool for businesses?
Sloan [31]

Answer:

D

Explanation:

4 0
3 years ago
Read 2 more answers
Which of the following is a category of authorization tools
Tpy6a [65]

Answer:

Cloud-Based eLearning Authoring Tools.Locally Hosted eLearning Authoring Tools. Multimedia eLearning Authoring Tools.PowerPoint Ribbon eLearning Authoring Tools.Screen Capturing And Recording eLearning Authoring Tools

Explanation:

Any software, or collection of software components, that authors can use to create or modify web content for use by other people, is an Authoring Tool.

5 0
3 years ago
At the ________ level of an organization, functional managers focus on monitoring and controlling operational-level activities a
Anon25 [30]

Answer:

Tactical Level

Explanation:

Based on the information provided within the question it can be said that the level of the organization that is being mentioned is called the Tactical Level. In this level managers focus choosing the tactics depending on the information that they gather from everyday operational activities. This information is later sent to the higher levels of the organization.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Ally typed a business letters she most likely used a
    5·1 answer
  • Need help with this file and due today!!
    6·1 answer
  • Is it more beneficial to have many folders or is it better to " nest subfolders? Explain your response
    5·1 answer
  • I have six nuts and six bolts. Exactly one nut goes with each bolt. The nuts are all different sizes, but it’s hard to compare t
    12·1 answer
  • Which of the following is a popular open source intrusion detection system that runs on SmoothWall?? Synchronous Dynamic Random
    6·1 answer
  • 1. Some of the music in the 1960s was used to protest social and political issues. Is music still used as a form of protest? Why
    13·1 answer
  • Technology trends in education play a key role in a student’s
    15·1 answer
  • Plz subscribe my yt gaming channel <br>FIREAZZ GAMING​
    8·2 answers
  • How many times do you return after the dateline ?
    12·1 answer
  • What type of databases is not limited by the data’s physical location?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!