1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
posledela
4 years ago
9

Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appro

priate routing/addressing information?
A) Address Resolution Protocol
B) Application layer address
C) TCP connection
D) None of these
Computers and Technology
1 answer:
IRINA_888 [86]4 years ago
6 0

Answer: (B) Application layer address

Explanation:

The application layer address basically contain the specific address for the processing in the system.

This type of application layer basically enable the user for accessing the network and also provide the user interface for providing the various types of services in the database management system.

The application layer address is not provided to the computer client during the first installation time on the TCP/IP (Transmission control protocol/ Internet protocol) network.

Therefore, Option (B) is correct.

You might be interested in
What is IBM compadibles
mixer [17]

Answer:

IBM PC compatible computers are computers similar to the original IBM PC, XT, and AT that are able to use the same software and expansion cards. Such computers were referred to as PC clones, or IBM clones

8 0
4 years ago
Which of the following is the smallest aperture (f-stop) opening?
Firlakuza [10]

Answer:

E) f/16

Explanation:

6 0
4 years ago
Which type of function distill the information contained within a file (small or large) into a single fixed-length number, typic
Luda [366]
As far as I remember, message-digest functions distill the information contained within a file (small or large) into a single fixed-length<span>number, typically between 128 and 256 bits in length. This function is designed to protect the integrity of a piece of data to define changes to any part of a message.</span>
7 0
4 years ago
You should process the tokens by taking the first letter of every fifth word,starting with the first word in the file. Convert t
zhenek [66]

Answer:

See explaination

Explanation:

import java.io.File;

import java.io.IOException;

import java.util.Scanner;

import java.util.StringTokenizer;

public class SecretMessage {

public static void main(String[] args)throws IOException

{

File file = new File("secret.txt");

StringBuilder stringBuilder = new StringBuilder();

String str; char ch; int numberOfTokens = 1; // Changed the count to 1 as we already consider first workd as 1

if(file.exists())

{

Scanner inFile = new Scanner(file);

StringTokenizer line = new StringTokenizer(inFile.nextLine()); // Since the secret.txt file has only one line we dont need to loop through the file

ch = line.nextToken().toUpperCase().charAt(0); // Storing the first character of first word to string builder as mentioned in problem

stringBuilder = stringBuilder.append(ch);

while(line.hasMoreTokens()) { // Looping through each token of line read using Scanner.

str= line.nextToken();

numberOfTokens += 1; // Incrementing the numberOfTokens by one.

if(numberOfTokens == 5) { // Checking if it is the fifth word

ch = str.toUpperCase().charAt(0);

stringBuilder = stringBuilder.append(ch);

numberOfTokens =0;

}

}

System.out.println("----Secret Message----"+ stringBuilder);

}

}

}

5 0
4 years ago
As a user of media what will you say to those people who are under of misleading use media
swat32

Answer:

search more sa google

6 0
3 years ago
Other questions:
  • Which license enables anyone on the network to install and use the software?
    14·1 answer
  • What is a binary digit
    7·1 answer
  • ________ is a dedicated device designed to manage encrypted connections established over an untrusted network such as the Intern
    12·1 answer
  • Benching system are prohibited in
    5·1 answer
  • You have a network that occupies the top floor of a three-story building. The WAN service provider has installed the line for th
    11·1 answer
  • A bookstore owner wants to allow customers to pay for books using their mobile phones. Which version of iOS will support the boo
    9·2 answers
  • I AM GIVING BRAINLIEST!!!!!!! PLEASE HELP !!!!!!!!
    7·2 answers
  • A signal causes the operating system to stop and assess what to do next.( Identify the name of this signal.)​
    5·1 answer
  • 3) Controls on a form or report that describe each field—often the field name—in the underlying table
    7·1 answer
  • You're a teacher and you've created a form letter in word that you send to the parents of the students in your class at the begi
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!