1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inga [223]
3 years ago
15

Which of the following commands should you use to determine whether there are any shared resources on a Windows computer with th

e IP address 193.145.85.202?
a. netstat -c 193.145.85.202
b. nbtscan -a 193.145.85.202
c. nbtstat -a 193.145.85.202
d. nbtstat -a \\193.145.85.202
Computers and Technology
2 answers:
kenny6666 [7]3 years ago
8 0
<h2><u>Answer</u>:</h2>

c. nbtstat -a 193.145.85.202

<h2><u>Explanation</u>:</h2>

Nbtstat is integrated into many versions of the Windows operating system and it is used for in the TCP/IP for NETBIOS troubleshooting and diagnosis. It is used to display the NETBIOS statistics of a computer.

The Nbtstat can be used with several attributes depending on the required function. For example, on the command line, if you type;

<em>Nbtstat -a [IPaddress]</em>

The NETBIOS name table of the computer with the given ip address (which will show whether or not there are shared resources) will be listed.

So, to determine whether there are shared resources on a Windows computer with IP address 193.145.85.202, the following command should be typed;

<em>Nbtstat -a 193.145.85.202</em>

<em></em>

Other attributes that could be used with nbtstat are;

i. -c which will show the contents of the NETBIOS name cache, and a table showing the NETBIOS names and their corresponding IP addresses.

ii. -n which will show locally registered names on the system.

Law Incorporation [45]3 years ago
7 0

Answer:

c. nbtstat -a 193.145.85.202

Explanation:

Nbtstat is a TCP/IP utility which is used to display the current connections and statistics of TCP/IP using NetBIOS over TCP/IP (NetBT).

It is installed on a computer running Microsoft Windows when the TCP/IP protocol stack is installed.

Also, it is very useful when we want to troubleshoot NetBIOS name resolution problems.

One can run nbtstat -a < ComputerName > to obtain the local NetBIOS name table on <ComputerName> and its MAC address

You might be interested in
In what year did alienware introduce alienfx lighting zones into their pc's?
ser-zykov [4K]
The answer to the question asked  above is 2006. 
<span>Alienware introduce alienfx lighting zones into their pc's on 2006.</span>

Hope my answer would be a great help for you.    If you have more questions feel free to ask here at Brainly.
8 0
3 years ago
A computer never gets tired or bored while working for a long time .. ​
Angelina_Jolie [31]

Answer :Computers never get tired or bored because of doing the same task continuously. They work in the same manner all the time. A computer can store large amount of information in its memory.

Explanation: it is quality which makes the user to be dependent on computer. As we all know, computer systems do repetitive tasks without any boredom, tiredness, or fatigue.

5 0
3 years ago
What is Sleep mode? Check all of the boxes that apply.
9966 [12]

It is a power-saving mode for a computer.

It is a power-saving mode designed for laptops.

6 0
3 years ago
Explain which implementation of the protection matrix is more suitable for the following operations___________.
Mars2501 [29]

Answer:

See explanation.

Explanation:

(a)

• To grant read access to a file for all users, access control list (ACL) is the best option.

o Create a group called 'all' with all users in it (assume the group name as 'all').

o Make a ACL for the file name with ACL as 'all:R'.

• It can also be done with capability list. With capability lists. it is sufficient to place the capability for the file in appropriate place in a capability system.

(b)

• To revoke write access for a file from all users, access control list (ACL) is the best option.

o Edit the ACL by removing the write access.

o If the group 'all: W' was the entry added to ACL, remove it from the ACL.

• It can also be done with capability list by changing the check field stored with the object.

(c)

• To grant write access to a file to John, Lisa. Christie and Jeff either the access control list method or the capability list can be used.

• It can be implemented with ACL as follows:

o Construct ACL for the file for all users,

o Then the ACL for file would be 'Christie, Jeff. John, Lisa: W'.

• It can be implemented using capability list method as follows:

o First construct the capability list for the file, 'file:W'.

o Then assign the above capability for each user named John, Lisa, Christie and Jeff.  

(d)

• To revoke execute access for a file from Jana, Mike, Molly, and Shane, access control lists are the only possibility.

o Edit the ACL by removing the execute access.

Hope this hels!

5 0
3 years ago
The contrast ratio of blue 80 text on a yellow-10 background is __ to 1.
Natalija [7]

Answer:

The Answer is 8...

Explanation:

8 0
3 years ago
Other questions:
  • What characteristics need to be exhibited by an organisation to improve its software process?
    7·1 answer
  • DLucy is planning to launch her podcast on career guidance for college students and has already recorded a few videos for market
    10·1 answer
  • What names of websites of presentation or visualization <br>​
    15·1 answer
  • Company policies require that all network infrastructure devices send system level information to a centralized server. Which of
    6·1 answer
  • Who is the person responsible for creating the original website content?
    14·1 answer
  • After you enter the details for the first selected recipient in the New Address List dialog box, click _______ to add another re
    9·1 answer
  • What was the first e-commerce service?
    10·1 answer
  • What is the default text-wrapping option when inserting images into a Word document?
    5·2 answers
  • C++
    11·2 answers
  • Type the correct answer in the box. Spell all words correctly. Code in which server-side language can be embedded into an HTML d
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!