1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andreev551 [17]
3 years ago
12

Software that manages the resources of the computer is called:

Computers and Technology
1 answer:
AleksAgata [21]3 years ago
6 0
A. Data management software.
You might be interested in
When you save a Notepad file for the first time, you must also A. print a copy for your records. B. give it a name. C. check the
Kruka [31]
Answer: Give it a name
3 0
3 years ago
The National Vulnerability Database (NVD) is responsible for actively performing vulnerability testing for every company's softw
V125BC [204]

Answer:

False

Explanation:

The answer to this question is false. This is because the NVD doesn't perform such tests on their own. Instead they they rely on third-party vendors, software researchers, etc to get such reports and do the assignment of CVSS scores for softwares

The National Vulnerability Database (NVD) is the United State governments leading resource for software vulnerability

8 0
3 years ago
2. A host computer with an IP address of 172.16.29.155 using a subnet mask of 255.255.255.0 and a gateway of 172.16.29.1 pings a
ASHA 777 [7]

Answer:

From the host IP address and subnet mask, you can tell that both computers are on the same network. Host 172.16.29.155 will need to send an ARP request broadcast for 172.16.29.83 to get the MAC address and update its ARP table if the host 172.16.29.83 has not already done so.

Explanation:

<h2>ADDRESS RESOLUTION PROTOCOL (ARP)</h2>

Address Resolution Protocol (ARP) is a procedure for mapping a logical address known as the IP address to a physical address known as MAC (Media Access Control) address in a local area network. The job of the ARP is essentially to translate 32-bit addresses to 48-bit addresses and vice-versa when using IP Version 4 (IPv4) to communicate on the network.

Most of the computer programs/applications use logical address (IP address) to send/receive messages, however, the actual communication happens over the physical address (MAC address) this happens in the layer 2 of the OSI model. An ARP request is a broadcast, and an ARP response is a Unicast.

Scenarios when ARP is used:

Scenario-1: The sender is a host and wants to send a packet to another host on the same network.

·        Use ARP to find another host’s physical address

Scenario -2: The sender is a host and wants to send a packet to another host on another network.

·        Sender looks at its routing table.

·        Find the IP address of the next-hop (router) for this destination.

·        Use ARP to find the router’s physical address

Scenario -3: the sender is a router and received a datagram destined for a host on another network.

·        Router checks its routing table.

·        Find the IP address of the next router.

·        Use ARP to find the next router’s physical address.

Scenario -4: The sender is a router that has received a datagram destined for a host in the same network.

·        Use ARP to find this host’s physical address.

The situation in the question above falls under scenario-1. From the host IP address and subnet mask, you can tell that both computers are on the same network. Host 172.16.29.155 will need to send an ARP request broadcast for 172.16.29.83 so to get the MAC address and update its ARP table if the host 172.16.29.83 has not already done so.

7 0
4 years ago
Why are laptop employment of computer popular these days​
steposvetlana [31]

Answer:

Because due to pandemic all the offices and employment sector are closed physically and to make their work smoothly people are preferring virtual platforms with the concept of work from home .

I hope it is helpful and mark me as brainlest and follow me plllzzz♥️♥️

7 0
3 years ago
Can someone please tell me how can I code this onto C# on Visual Studio 2019? It’s due tomorrow!!
11111nata11111 [884]

Answer:

i need points

Explanation:

lol

8 0
3 years ago
Other questions:
  • 3. If B3=6 and D5=8, what would the following function return? IF(B3&gt;D5, "Closed", D5-B3) *
    10·2 answers
  • A developer writes a trigger on the Account object on the before update event that increments a count field. A workflow rule als
    12·1 answer
  • How many 32 bit integers can be stored in 16 byte cache block in matlab?
    15·1 answer
  • People who work the total hours for which they get paid have
    7·2 answers
  • Which process is used to protect transmitted data in a vpn?
    12·1 answer
  • PLEASE HELP!<br> How do you "brainliest" an answer?
    13·2 answers
  • Describe any five GSM PLMN basic services?
    10·1 answer
  • Help!!
    15·1 answer
  • Need the answer ASAP!!!
    5·1 answer
  • Physical and data link layer standards govern transmission in ________. LANs WANs Both LANs and WANs Neither LANs nor WANs
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!