1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stellarik [79]
3 years ago
13

A host wants to send a message to another host with the IP address 115.99.80.157. IP does not know the hardware address of the d

estination device. Which protocol can be used to discover the MAC address?
BOOTP
ARP
DNS
DHCP
IGMP
ICMP
Computers and Technology
2 answers:
Ivenika [448]3 years ago
8 0

The person is correct above me

Darya [45]3 years ago
3 0

Answer: ARP ( Address Resolution Protocol)

Explanation:

 The address resolution protocol is is one of the type transmission protocol that helps in determining the address of the MAC (Media access control) layer and the IPV4 address.

  • It is basically use for resolving the given IP address by using the hardware and the media access control in the network interface.
  • The main function of the ARP is that it typically used the MAC address for identifying the various types of mode in the network.
  • It is used the ARP format in the form of packet structure for transmitting the message from one place to another in the local network.    

  Therefore, the host is using the address resolution protocol for discovering the MAC address.  

You might be interested in
In order to create a horizontal 2-inch-thick dotted green line exactly 2 inches away from the top of the canvas, a graphic artis
Harrizon [31]

Answer:

I Think meter .

Explanation:

Not so Sure

4 0
3 years ago
Read 2 more answers
A differential backup covers what data on a system?
sergey [27]

Answer:

Answer is option (a) It includes data that has changed since the last full backup.

Explanation:

Differential Backup is a method used in Database Management Systems (DBMS) in which it includes the data (copies of all the files) that has changed (either created or updated or altered) since the last full backup. If it is a partial backup instead of full backup, then it is not a differential backup method as many files might have changed. Option (b) is false as the backup has to be a full backup not an incremental backup. Option (c) is false as the backup has to be a full backup ( not just a backup ), Option (d) is false as only the files that are changed is stored not the whole database since a full backup.

6 0
4 years ago
Create a loop that will output all the multiples of 5 that are greater than zero and less than 60 (do not include 60). 5, 10, 15
DiKsa [7]

Answer:

Explanation:

Let's do this in python

(a) Between 5 and 60 and divisible by 5

for i in range(5, 60/5):

    print(5*i)

(b) Less than 200 and divisible and 2 and 7

for i in range(1, int(200/14) + 1):

    print(14*i)

(c)Sum of multiple of 8 that are between 100 and 500

sum_result = 0

for i in range(100, 500):

    if i % 8 == 0:

         sum_result += i

print(sum_result)

(d)sum of all odd numbers between 20 and 10

sum_odd = 0

for i in range(10, 20):

    if i % 2 == 1:

         sum_odd += i

print(sum_odd)

3 0
3 years ago
Some request lists might cause the disk scheduler to act the same when the three different algorithms are run. Create a request
storchak [24]

Answer:

35, 25, 50, 75, 95

Explanation:

List of five track numbers that will cause all three algorithms to visit the same tracks in the same order are -

35

25

50

75

95

Please go to attachment for the diagram how these 5 tracks will be traversed by various algorithms.

All the algorithms traverse in the order 35 -> 25 -> 50 -> 75 -> 95

7 0
3 years ago
What materials can I find at home and make a cell phone tower​
MAVERICK [17]

Answer:

you cant

Explanation:

You simply cant make a tower from materials found in a household

4 0
3 years ago
Other questions:
  • HELP PLEASE ASAP brainliest to accurate
    14·2 answers
  • Write a program that opens a text file and reads its contents into a queue of characters. The program should then dequeue each c
    11·1 answer
  • "In about 100 words, describe the idea behind software as a service (SaaS). In your answer, include at least three examples of e
    10·1 answer
  • In 2-5 sentences, explain how columns can be used and set up to increase the effectiveness of business documents.
    11·1 answer
  • Write a program that reads in characters from standard input and outputs the number of times it sees an 'a' followed by the lett
    11·1 answer
  • What is considered to be the core of the Unix operating system ?
    14·1 answer
  • Someone who wants to learn a skilled trade on the job should consider
    6·2 answers
  • How can you determine if the story is told in the third person
    5·1 answer
  • Find the smallest value of n such that LCM of n is 15 is 45​
    5·1 answer
  • Which trait can be a positive or negative?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!