1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klemol [59]
3 years ago
6

When communicating with a server on another subnet, which of the following settings is used to determine which direction it need

s to go to get to its final destination?
a. Subnet mask
b. Default gateway
c. DNS
d. IP address
Computers and Technology
1 answer:
wariber [46]3 years ago
8 0

Answer: b) Default gateway

Explanation:

Default gateway  is the point of access through which information is sent from source to reach the destination in a network though computer towards different network.

  • It provides destination to all the traffic on the network as default when route data packets don't match with the IP address .
  • Other options are incorrect because subnet mask is masking technique for splitting it into the network address and host address.Domain Name Servers (DNS) is the system for naming in network. IP address is the internet protocol address.
  • Thus, the correct option is option(b).
You might be interested in
A message is sent to all hosts on a remote network. Which type of message is it?.
Nimfa-mama [501]

Answer:

a directed broadcast

Explanation:

4 0
1 year ago
What connector has 4 pins, is used for older IDE drives and some SATA drives, and can provide +5 V and +12 V power outputs?
Dominik [7]

Answer:

The correct answer to the following question will be "Molex connector".

Explanation:

The Molex connector can be used for power connections on some kind of device for just a disk drive as well as many other electronic devices including CD-ROMs, display chips, etc.

  • Inside a PC shell, the Molex connectors carry DC power to a device.
  • Most providers offer accessible connections, not only the Molex as well as AMP connectors.

So, it's the right answer.

3 0
3 years ago
You have to sort 1 GB of data with only 100 MB of available main memory. Which sorting technique will be most appropriate?
Arte-miy333 [17]
I’m guessing that what’s being looked at here moreso is the space complexity of these algorithms. Heap sort and insertion sort I believe have the lowest of these, but insertion sort is also known to not be the best with time complexity. Therefore heap sort should take the cake
8 0
3 years ago
Which of the following terms are aspect ratios for devices? 'select all that apply
Viktor [21]

Answer:

1080 x 1920

800 x 600

Explanation:

These are the screen sizes that you can find in the list of the screen sizes, which can be easily found in the document that lists all the screen sizes. You will certainly find the 1080 x 1920 and also the 800 x 600, however, you will not find the 320 x 240 and 800 x 600. The last two are the standard screen sizes and hence are not the correct options. The correct options are as listed above.

3 0
3 years ago
Portable Document Format (PDF) is a file format that provides an electronic image of a document and can be viewed, printed, and
bogdanovich [222]
True a pdf is a file format that provides a electronic image of a document and it can be viewed, printed and electronically transmitted.
7 0
3 years ago
Read 2 more answers
Other questions:
  • Marisol manages the online advertising campaigns for a chain of toy stores with both a physical and an online presence. Which Go
    7·1 answer
  • To print a range of cells in the active worksheet, click ____ in the settings area in the print gallery.
    14·1 answer
  • Claudia has a bachelors degree in computer information systems and she has learned to use some popular software testing tolls wh
    13·2 answers
  • how to answer the questions on brainly? I've typed my answer in the box but there's no submit button or whatever, and the only t
    14·2 answers
  • In which of the security mechanism does the file containing data of the users/user groups have inbuilt security?
    6·1 answer
  • Define the following term. data, database, DBMS, database system, data- base catalog, program-data independence, user wen', DBA,
    12·1 answer
  • 3. State whether the given statements are true or false. a. The computer is called a data processor because it can store, proces
    13·1 answer
  • How to make a harmonic mean algorithm in bash Linux?
    15·1 answer
  • Leslie works in an SDLC team. When Leslie edits a file, it gets saved as an altered version. Later all the altered versions are
    9·1 answer
  • On the new iOS version, can you save photos from ‘review confirmed photos’? If so, how? Thanks!
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!