1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klemol [59]
4 years ago
6

When communicating with a server on another subnet, which of the following settings is used to determine which direction it need

s to go to get to its final destination?
a. Subnet mask
b. Default gateway
c. DNS
d. IP address
Computers and Technology
1 answer:
wariber [46]4 years ago
8 0

Answer: b) Default gateway

Explanation:

Default gateway  is the point of access through which information is sent from source to reach the destination in a network though computer towards different network.

  • It provides destination to all the traffic on the network as default when route data packets don't match with the IP address .
  • Other options are incorrect because subnet mask is masking technique for splitting it into the network address and host address.Domain Name Servers (DNS) is the system for naming in network. IP address is the internet protocol address.
  • Thus, the correct option is option(b).
You might be interested in
6. Why did he choose to install the window not totally plumb?
Dmitriy789 [7]

Answer:

Because then it would break

Explanation:

You achieve this by obtaining correct measurements. When measuring a window, plumb refers to the vertical planes, and level refers to the horizontal planes. So he did not install the window totally plumb

8 0
3 years ago
What is the full form of RPM in computer ​
alex41 [277]

Full from of RPM in computer is Revolutions Per Minute.

4 0
3 years ago
Read 2 more answers
The Internet has made it possible for most people to order all of their clothing online. While this may be a preference for some
suter [353]

Answer:

Explanation:

Based on the information provided in this scenario it can be said that this is likely due to there being a cultural lag between having the Internet and using the technology to its full capacity. Cultural lag refers to the notion that culture takes time to catch up with technological innovations, mainly due to not everyone has access to the new technology. As years pass a specific technological advancement becomes more readily accessible to the wider public as is thus more widely adopted.

3 0
3 years ago
Carly is part of a community of developers. In her free time, she works on code to improve this open-source operating system. Th
mina [271]

Answer:

The answer to this question is given below in the explanation section.

Explanation

Carly is part of a community of developers. In her free time, she works on code to improve this open-source operating system. The OS she's working on is most likely are:

  1. Linux
  2. OpenBSD
  3. FreeBSD
  4. NetBSD
  5. AROS
  6. Tock
  7. FreeDOS
  8. Dragonfly BSD
  9. Qubes OS
  10. Haiku
  11. Redox
  12. ReactOS
  13. Subgraph OS
  14. osv.io
  15. ToaruOS
  16. Mezzano
  17. House
  18. Minoca OS
  19. SOS
  20. PowerNex
  21. Interim OS
  22. KolibriOS
  23. MINIX
  24. HelenOS
  25. Sculpt
  26. Harvey
  27. illumos
  28. GeckOS/A65 V2.0
  29. Serenity
  30. GNU Hurd
  31. Plan 9
  32. AquilaOS
  33. Biscuit
  34. Xv6

These are the different opensource operating systems.

3 0
3 years ago
Inattentional blindness occurs when individuals do not observe certain objects or events because they are focused on something e
PSYCHO15rus [73]
The answer is True have a good day
5 0
3 years ago
Read 2 more answers
Other questions:
  • After doing the route tracing to a particular IP addresses, paste the path of IP addresses that were taken from your IP address
    13·1 answer
  • During the charging of a storage battery, what is the temperature that the electrolyte solution must never exceed?
    6·1 answer
  • Edhesive coding practice 3.4​
    12·1 answer
  • You open a folder Properties box to encrypt the folder, click Advanced, and discover that Encrypt contents to secure data is dim
    10·1 answer
  • _________function tells the cin object to skip one or more characters in the keyboard buffer.
    11·1 answer
  • Which K-Drama was made in 2009?
    5·2 answers
  • PLZZZ HELP!!!
    9·1 answer
  • DERECTIONS: Identify all the computer software that you need for the following entrepreneurial activities. Refer your answer fro
    5·1 answer
  • A data analyst adds descriptive headers to columns of data in a spreadsheet. How does this improve the spreadsheet?.
    8·1 answer
  • Which of the following tasks are suitable for creating an algorithm? Choose all that apply
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!