1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inga [223]
3 years ago
15

Which of the following commands should you use to determine whether there are any shared resources on a Windows computer with th

e IP address 193.145.85.202?
a. netstat -c 193.145.85.202
b. nbtscan -a 193.145.85.202
c. nbtstat -a 193.145.85.202
d. nbtstat -a \\193.145.85.202
Computers and Technology
2 answers:
kenny6666 [7]3 years ago
8 0
<h2><u>Answer</u>:</h2>

c. nbtstat -a 193.145.85.202

<h2><u>Explanation</u>:</h2>

Nbtstat is integrated into many versions of the Windows operating system and it is used for in the TCP/IP for NETBIOS troubleshooting and diagnosis. It is used to display the NETBIOS statistics of a computer.

The Nbtstat can be used with several attributes depending on the required function. For example, on the command line, if you type;

<em>Nbtstat -a [IPaddress]</em>

The NETBIOS name table of the computer with the given ip address (which will show whether or not there are shared resources) will be listed.

So, to determine whether there are shared resources on a Windows computer with IP address 193.145.85.202, the following command should be typed;

<em>Nbtstat -a 193.145.85.202</em>

<em></em>

Other attributes that could be used with nbtstat are;

i. -c which will show the contents of the NETBIOS name cache, and a table showing the NETBIOS names and their corresponding IP addresses.

ii. -n which will show locally registered names on the system.

Law Incorporation [45]3 years ago
7 0

Answer:

c. nbtstat -a 193.145.85.202

Explanation:

Nbtstat is a TCP/IP utility which is used to display the current connections and statistics of TCP/IP using NetBIOS over TCP/IP (NetBT).

It is installed on a computer running Microsoft Windows when the TCP/IP protocol stack is installed.

Also, it is very useful when we want to troubleshoot NetBIOS name resolution problems.

One can run nbtstat -a < ComputerName > to obtain the local NetBIOS name table on <ComputerName> and its MAC address

You might be interested in
Is monitor is a television​
Stolb23 [73]

Answer: Can you rephrase the question

Explanation:

3 0
3 years ago
Read 2 more answers
During the maintenance phase of the sdlc, the team must _____ if a system's objectives are not being met
Darya [45]

During the maintenance phase of the sdlc, the team must take the correct action if a system's objectives are not being met

<h3>What are the 5 phases of the traditional SDLC Software Development process)?</h3>

Software process is the set of activities that constitute the development of a computer system. These activities are grouped into phases, such as: requirements definition, analysis, design, development, testing and deployment.

The main focus of this phase of the SDLC is to ensure that the needs continue to be met and that the system continues to function as per the specification mentioned in the first phase.

See more about SDLC at brainly.com/question/14096725

#SPJ1

8 0
2 years ago
Write a function called no_you_pick. no_you_pick should have two parameters. The first parameter is a dictionary where the keys
Pachacha [2.7K]

Answer:

...

Explanation:

6 0
3 years ago
9. Name at least two types of hard drives?
JulsSmile [24]
IDE: Integrated drive electronics

Sata:Serial advance technology attachment
5 0
3 years ago
Ayudaa, 5 ejes de sistemas tecnológicos
sashaice [31]

Answer:

support 5 axes of technological systems

Explanation:

4 0
3 years ago
Other questions:
  • With respect to the general classes of computers, a ________ is the most expensive and most powerful kind of computer, which is
    7·1 answer
  • Define a function setheight, with int parameters feetval and inchesval, that returns a struct of type heightftin. the function s
    6·1 answer
  • When you arrive at work one morning, your inbox is full of messages complaining of a network slowdown. you collect a capture fro
    12·1 answer
  • What is the purpose of ergonomics in the workplace? A.Keep workers safe and injury free
    5·2 answers
  • How does a layered pattern make use of abstraction and encapsulation?
    10·1 answer
  • Is it safe to take apart a computer monitor?
    13·1 answer
  • The duties of a database administrator include determining which people have access to what kinds of data in the database; these
    13·2 answers
  • The set of rules for how computers talk to one another
    6·1 answer
  • What best describes the ability to increase the access to server resources and provide fail-safe services by linking two or more
    13·1 answer
  • I have a top-secret recipe for the greatest cookie dough I have made and I want to keep the recipe a secret so I apply for a? *
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!