1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
EastWind [94]
4 years ago
15

When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers

in the subnet.
Computers and Technology
2 answers:
kozerog [31]4 years ago
8 0

Answer:

Broadcast message

Explanation:

A broadcast message is a specialized type of message sent to all computers, or other networking devices, on a particular local area network(e.g Ethernet) or subnet. In the TCP/IP protocol, the broadcast message is sent when the network layer address is translated into a data-link layer address.

Examples of a broadcast message transmission are television signals sent from a source network to all viewers around the globe.

In a LAN (local area network), the address resolution protocol uses the concept of broadcast messaging to send an address resolution query to all the networking devices connected to the LAN.

Therefore, in essence, a broadcast message is sent from one source network device to multiple destination networking devices basically on the same network.

Llana [10]4 years ago
3 0

Answer:

Broadcast message

Explanation:

The network models like OSI and TCP/IP suites have standard layers and protocols that governs the communication of end devices in a network.

The TCP/IP suite model has four layers which are application, transport, internet and network access layers. The network access does the work of both the data-link and physical layer of the OSI model.

When the packet is encapsulated in a data-link header and trailer, and needs to be sent to another unknown host, a broadcast message is sent to all the computers in the network to retrieve the remote host address for a unicast transmission to take place.

You might be interested in
Which keyboard shortcut do we use to turn on APC?​
ANEK [815]

Answer:

ctrl p I gusse hop it helps

bye know have a great day

Explanation:

8 0
3 years ago
Twenty years ago, most games were sold in brick and mortar stores. How did independent game developers get their games into thes
Svetlanka [38]

Answer: by working with a publisher who would help the developer bring their games to stores and then market them and get as much exposure and traction as possible

Explanation:

Publishers were and are still important in the gaming world even if they have now increasingly moved online. Publishers have a reputation and with this reputation comes access to a wide array of services that enable them to sell games.

This was the same when most stores were brick and mortar. One would sign a deal with a publisher who through their expertise would help the game get to market and give it publicity so that it can be sold.

6 0
3 years ago
Allan is manager of the software. His team has compiled various design documents prior to starting the development of the softwa
Hunter-Best [27]

Answer:

i think the answer is B

Explanation:

idk

7 0
3 years ago
Which of these is an application to control
N76 [4]

Not sure if your asking what certain application or the definition. But the definition: A security practice that blocks or restricts unauthorized applications from executing in ways that put data at risk.

6 0
3 years ago
Which of the following characteristics of an e-mail header should cause suspicion?A. Multiple recipientsB. No subject lineC. Unk
julsineya [31]

Answer:

The correct answer for the given question is option(b) i.e " No subject line"

Explanation:

In the e-mail subject is the important part which describe the information which kind of particular mail is send or received .if we do not give any subject line in the e-mail header then most of the chances that email will not read by recipients due to this suspicion will be caused.

Unknown Sender and Multiple recipients do not cause suspicion so the correct answer is option(b) i.e No subject line".

3 0
3 years ago
Other questions:
  • Number of byte required to store illumination
    13·1 answer
  • The LTE (cellular telephone) standard supports only packet switching"". What cellular services are morst affected by this change
    15·1 answer
  • Create a stack with three integers and then use .toarray to copy it to an array.
    10·1 answer
  • Which is the highest level of the hierarchy of needs model?
    7·2 answers
  • . What are the disadvantages of using small, fixed-length cells in ATM?
    13·2 answers
  • How to change font size and style and add a table when creating a webpage?
    6·1 answer
  • Which type of address is used at the transport layer to identify the receiving application?
    14·1 answer
  • During the _______ steps of the information processing cycle, data is manipulated, calculated, or organized to create useful inf
    9·1 answer
  • Write a C program that reads two hexadecimal values from the keyboard and then stores the two values into two variables of type
    15·1 answer
  • What are the benefits of computer literacy?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!