1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inga [223]
3 years ago
15

Which of the following commands should you use to determine whether there are any shared resources on a Windows computer with th

e IP address 193.145.85.202?
a. netstat -c 193.145.85.202
b. nbtscan -a 193.145.85.202
c. nbtstat -a 193.145.85.202
d. nbtstat -a \\193.145.85.202
Computers and Technology
2 answers:
kenny6666 [7]3 years ago
8 0
<h2><u>Answer</u>:</h2>

c. nbtstat -a 193.145.85.202

<h2><u>Explanation</u>:</h2>

Nbtstat is integrated into many versions of the Windows operating system and it is used for in the TCP/IP for NETBIOS troubleshooting and diagnosis. It is used to display the NETBIOS statistics of a computer.

The Nbtstat can be used with several attributes depending on the required function. For example, on the command line, if you type;

<em>Nbtstat -a [IPaddress]</em>

The NETBIOS name table of the computer with the given ip address (which will show whether or not there are shared resources) will be listed.

So, to determine whether there are shared resources on a Windows computer with IP address 193.145.85.202, the following command should be typed;

<em>Nbtstat -a 193.145.85.202</em>

<em></em>

Other attributes that could be used with nbtstat are;

i. -c which will show the contents of the NETBIOS name cache, and a table showing the NETBIOS names and their corresponding IP addresses.

ii. -n which will show locally registered names on the system.

Law Incorporation [45]3 years ago
7 0

Answer:

c. nbtstat -a 193.145.85.202

Explanation:

Nbtstat is a TCP/IP utility which is used to display the current connections and statistics of TCP/IP using NetBIOS over TCP/IP (NetBT).

It is installed on a computer running Microsoft Windows when the TCP/IP protocol stack is installed.

Also, it is very useful when we want to troubleshoot NetBIOS name resolution problems.

One can run nbtstat -a < ComputerName > to obtain the local NetBIOS name table on <ComputerName> and its MAC address

You might be interested in
Why does this happen
djverab [1.8K]

Answer:

I dont know, but it might be because of the *pew pew*( I think it's silly that people can get offended over that)

Explanation:

(it literally will not let me say that word)

6 0
2 years ago
You use worksheets to perform calculations. How do you perform these calculations?
Elena-2011 [213]
The main function you will use is.... Type SUM= in all caps into a cell and then you can control click cells to add them together. You can also add PEMDAS properties to do calculations withing it.
5 0
3 years ago
Read 2 more answers
Does anyone know what anotmy means​
deff fn [24]

Answer:

also its spelled anatomy

Explanation:

The branch of science concerned with the bodily structure of humans, animals, and other living organisms, especially as revealed by dissection and the separation of parts.

Hope this helped :3

3 0
3 years ago
Read 2 more answers
Which process improves the life of a computer?
arlik [135]

maintenance is the answer

3 0
3 years ago
A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
iogann1982 [59]

Answer:

a. Security tab

Explanation:

These options would be under the security tab. The security tab allows you to protect yourself when browsing the web. It includes features such as cookies, location, pop-up blocker and tracking protection. This allows you to avoid harmful or malicious content. In this example, your coworker wants to minimize attacks when using the Internet. Therefore, this is the tab that would help her the most.

7 0
3 years ago
Other questions:
  • You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits m
    13·1 answer
  • The ____ shortcut keys remove character formatting. (points : 2) ctrl 0 (zero) ctrl i ctrl spacebar ctrl u
    8·2 answers
  • A microphone, a track ball, and speakers are all examples of ____. hardware software
    6·2 answers
  • Human factors is the study of:
    5·1 answer
  • What video game has made the most money as of 2016?
    15·2 answers
  • Write a question that the database will understand. Which records are not equal to 5? &lt; 5 &gt; 5 &gt; =5 &lt; &gt; 5
    15·1 answer
  • PLEASE HELP!!!!!!!!!
    8·1 answer
  • Select the correct answer..
    6·1 answer
  • Which item is developed last in the cyclical process?
    5·2 answers
  • Which device is used to direct the flow of data on a computer network?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!