1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
otez555 [7]
3 years ago
10

You are going to be installing a videoconferencing system. One of the requirements of the system is that only workstations that

run the conferencing client application receive packets related to the videoconference. You need to assign an address to the videoconferencing application. Which of the following addresses is appropriate?
Computers and Technology
1 answer:
Westkost [7]3 years ago
5 0

Answer:

229.1.100.1.

Explanation:

The user will have a video conferencing device installed. Some of the device's demands are that those desktop computers running the conferencing client app collect videoconference associated packets. He must allocate the video conferencing app to such an address.

So, the addresses 229.1.100.1 are suitable according to the following scenario.

You might be interested in
What are the Technical Skills do Penetration Testers need to have?
Alla [95]

1. Tester should understand the vulnerability of the system because by this skill it should be able to secure the system for the parts where the attacks can be done.

2. Understand the web technologies and communication techniques of them because the two way communication understanding is one of the most important skill a tester should have so that he/she should have a proper image of what the system doing and how it is doing it.

3. Ability yo code scripts and most importantly understand them because while testing there are many script code to be read and understand for any bug or error the system is facing.

5 0
3 years ago
The MAC address is a _____ bit number.
Charra [1.4K]

Answer:

48.

Explanation:

MAC addresses are 48 bits or 6 bytes or 12 digit hexadecimal numbers.There are three formats of writing the MAC address which are as following:-

MM-MM-MM-SS-SS-SS

MMM.MMM.SSS.SSS

MM:MM:MM:SS:SS:SS

MAC address also called the physical address is a binary number which is used to  uniquely identify the computer network adapters.MAC address is assigned to the system at the time of manufacturing.

6 0
4 years ago
Read 2 more answers
Given the following business scenario, create a Crow’s Foot ERD using a specialization hierarchy if appropriate. Two-Bit Drillin
Roman55 [17]

Answer:

Crows Foot ERD of TWo-Bit Drilling Company  

  • The circumstance is that organization holds the data of representative and protection wards in which a worker can have more than one ward or no ward however all the wards ought to be snared with just a single worker.  
  • The representative table contains all data of worker and the protection subordinate table contain data of worker's needy.  
  • A few representatives are examiners which contains the extra information of date of accreditation and confirmation recharging date.  
  • The EMPLOYEE table contains EMP_NO, EMP_NAME, EMP_DATEHIRED, EMP_TITLE, EMP TYPE and EMP SSN as traits.  
  • The INSURANCE_ DEPENDENT table contains subordinate EMP_NO, DEPENDENT_NAME, DEPENDENT_DOB and DEPENDENT_RELATIONSHIP (relationship of ward and worker).  
  • One Employee can be identified with at least 0 Dependents however any Dependent is identified with just a single Employee.  
  • EMP_TYPE is the subtype discriminator which tells the event of INSPECTOR.

The Attached file Show the Crow Foot ERD

6 0
3 years ago
Which type of operating system is usually used in personal computers?
babunello [35]

Answer:

Windows and Mac OS

Explanation:

8 0
3 years ago
Cedric received a disc when he purchased new word processing software. The disc will allow him to install the software. What typ
Goshia [24]
The answer would be A, ROM. CD-ROMs allow for easy software installation from a disk
6 0
3 years ago
Other questions:
  • Filtering removes data from the spreadsheet. A. True B. False
    9·2 answers
  • The figure above shows two pith balls suspended by threads from a support. In the figure, A. the pith balls are uncharged. B. pi
    13·2 answers
  • Many people object to increased cybersecurity because _____.
    12·2 answers
  • Suppose that you are developing an application in which you want to connect to a server to upload some data. You create a socket
    6·1 answer
  • TRUE OR FALSE!!!!!
    6·2 answers
  • Which camera options shows time to be slowly
    5·1 answer
  • How does a hard drive work
    6·2 answers
  • Charlie makes pizza at a restaurant. The customers always compliment how great the pizza tastes. But Charlie takes a long time t
    7·2 answers
  • একটি ডকুমেন্ট তৈরী করে ড্রাইভে সেভ করার পদ্ধতি বর্ণনা করো
    10·1 answer
  • Opposite word of reassembling​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!