1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inga [223]
3 years ago
15

Which of the following commands should you use to determine whether there are any shared resources on a Windows computer with th

e IP address 193.145.85.202?
a. netstat -c 193.145.85.202
b. nbtscan -a 193.145.85.202
c. nbtstat -a 193.145.85.202
d. nbtstat -a \\193.145.85.202
Computers and Technology
2 answers:
kenny6666 [7]3 years ago
8 0
<h2><u>Answer</u>:</h2>

c. nbtstat -a 193.145.85.202

<h2><u>Explanation</u>:</h2>

Nbtstat is integrated into many versions of the Windows operating system and it is used for in the TCP/IP for NETBIOS troubleshooting and diagnosis. It is used to display the NETBIOS statistics of a computer.

The Nbtstat can be used with several attributes depending on the required function. For example, on the command line, if you type;

<em>Nbtstat -a [IPaddress]</em>

The NETBIOS name table of the computer with the given ip address (which will show whether or not there are shared resources) will be listed.

So, to determine whether there are shared resources on a Windows computer with IP address 193.145.85.202, the following command should be typed;

<em>Nbtstat -a 193.145.85.202</em>

<em></em>

Other attributes that could be used with nbtstat are;

i. -c which will show the contents of the NETBIOS name cache, and a table showing the NETBIOS names and their corresponding IP addresses.

ii. -n which will show locally registered names on the system.

Law Incorporation [45]3 years ago
7 0

Answer:

c. nbtstat -a 193.145.85.202

Explanation:

Nbtstat is a TCP/IP utility which is used to display the current connections and statistics of TCP/IP using NetBIOS over TCP/IP (NetBT).

It is installed on a computer running Microsoft Windows when the TCP/IP protocol stack is installed.

Also, it is very useful when we want to troubleshoot NetBIOS name resolution problems.

One can run nbtstat -a < ComputerName > to obtain the local NetBIOS name table on <ComputerName> and its MAC address

You might be interested in
3.6 lesson practice
Thepotemich [5.8K]

what...? how is this a question??

5 0
3 years ago
Deirdre has a hearing disability. One of her friends advised her to use real-time text or RTT on her phone. In which of these
ozzi

The way that real-time text or RTT on her phone can help her is that;

C: On phone calls, it will convert speech into text

<h3>Speech to Text</h3>

We are told that Deirdre has a hearing disability. This means that she has difficulty in hearing words clearly but can read.

Thus, from her friends advice about real time text or RTT, it will aid her because whenever someone calls her on the phone, it can convert the content of the call speech into text.

The missing options are;

A. It will make her phone vibrate to notify her when she gets a phone call

B. It will make her phone vibrate to notify her when she gets a text message.

C. On phone calls, it will convert speech into text. D. While text messaging, it will convert text into speech

Read more on speech to text at; brainly.com/question/2375490

5 0
2 years ago
What are some random fun facts about Technology?
Lana71 [14]

Answer:

i do not know

Explanation:

but it helps to communication

5 0
2 years ago
I NEED HELP QUICK
Serjik [45]

Answer: keeps confidential documents secure,

displays a GUI, allocates the computer's resources, and retrieves files

Explanation:

The operating system can be defined as the software installed in the system that provides the information and services to the users by controlling the hardware, software resources, and regulates the computer programs. It runs the applications and programs in the system, displays the graphic user interface for the services, stores, manipulates, and retrieves files. It prevents the unauthorized access to the data and programs by using passwords thus provides the security to the system and documents.

8 0
2 years ago
Assslainsdffddsvvdesdssbhasasco5m
alexandr402 [8]
Hahahahaha I wanna was the day I wanna was the last time I got to
8 0
3 years ago
Read 2 more answers
Other questions:
  • SELECT vendor_name, COUNT(*) AS number_of_invoices, MAX(invoice_total - payment_total - credit_total) AS balance_due FROM vendor
    15·1 answer
  • "Which of the following will help protect against a brute force attack?
    11·1 answer
  • Define a function setheight, with int parameters feetval and inchesval, that returns a struct of type heightftin. the function s
    6·1 answer
  • Why does temperature decrease with higher altitude?
    14·1 answer
  • Book checkout scenario at a library: The Worker tells the System the identity of a patron who wishes to check out books. The Sys
    8·1 answer
  • _______ are special incentives or excitement-building programs that encourage consumers to purchase a particular product, often
    7·1 answer
  • Where is an ideal location to build a ground based observatory?
    10·1 answer
  • Which coding term means to carry out a series of steps one after another?
    7·2 answers
  • What is a guardian node summary for theta staking tool
    9·1 answer
  • St. CHarles school's music community is organizing a fundraiser. They want to create a simple but attractive website. However, t
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!