1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natulia [17]
4 years ago
12

Which single OSPF network statement will correctly include all the interfaces on a device whose IP addresses only begin with a 1

0.10.8, 10.10.9, 10.10.10, or 10.10.11
Computers and Technology
1 answer:
tester [92]4 years ago
4 0

Answer:

network 10.10.8.0 0.0.3.255 area 0

this will include all the interfaces on a device whose IP addresses only begin with a 10.10.8, 10.10.9, 10.10.10, or 10.10.11.

Explanation:

<em>show ip ospf interface </em>

<em>show ip ospf interface brief</em>

these commands are used to display the interfaces that have been enabled into local ospf . it also shows explanation about them by brief command mentioned above.

<em />

You might be interested in
A heuristic is applied during a search process in hopes of producing a
tekilochka [14]
The answer that best completes the statement above is DEPTH-FIRST SEARCH. This is what is produced in the application of heuristic during a search process. When we say heuristic, this is the kind of approach done in order to discover something or to solve a particular problem. The Depth-First Search or also known as DFS, is a kind of algorithm that is used to analyze something by branching out ideas but in a backtracking manner.
3 0
3 years ago
A company wants to transmit data over the telephone, but they are concerned that their phones may be tapped. All of their data i
erastovalidia [21]

Answer:

def encrypt_digit(digit):

   if type(digit) is int or float:

       digit = str(digit)

   hold = list()

   for x in digit:

       d = str((int(x) + 3)%10)

       hold.append(d)

   first = hold.pop(0)

   second = hold.pop(0)

   third = hold.pop(0)

   fourth = hold.pop()

   print(int("".join([third,fourth, first, second])))

encrypt_digit(7836)

Explanation:

The python function accepts a four-digit parameter which represents the data transmitted over the company's telephone network. The function encrypts the data by adding 3 to each digit and getting the modulus of division 10, then the digits are swapped and printed out encrypted and ready for transmission.

6 0
3 years ago
Tim and Eric recently started a company focused on rehabbing old houses. Before they buy a house, they use software to create an
sp2606 [1]

Answer: True

Since both partners make informed decisions about the houses before actually implementing them with information from the software

Explanation:

CAD computer aided design is the use of computers to aid in the creation, modification, analysis, or optimization of a design. CAD software is used to increase the productivity of the designer, improve the quality of design, improve communications through documentation, and to create a database for manufacturing or decision making

5 0
4 years ago
Read 2 more answers
What is the best AI app used in education?
goblinko [34]

Answer:

Khan Academy is the best app for education, you can watch videos and do quizes

5 0
3 years ago
Contemporary operation of networking technology is possible only through the usage of open-use technology and layering approache
eimsori [14]

Answer: TRUE

Explanation: Networking technology is the term used to describe the entire processes through which computer or mobile systems are linked up either through optic fibers,wireless systems in order to enhance effective communication across networks or regions.

OSI (open system interconnection), the earliest models partitions into seven layers and the OSI is known as model that creates partitioning a communication system classing them into abstraction layers.

8 0
3 years ago
Other questions:
  • DOES ANYONE KNOW HOW TO CHAGE THE IP ON A COMPUTER?
    8·1 answer
  • What’s a sign you should talk to an adult about your online time
    14·2 answers
  • 2. How do web bugs invade a person’s privacy?
    10·2 answers
  • What is the process called if you are erasing data on your hard drive from a MAC
    12·1 answer
  • The five steps in the fetch/execute cycle and how do they correspond to a restaurant
    5·1 answer
  • The growing network of physical objects that will have sensors connected to the Internet is referred to as the ________.
    13·1 answer
  • In computer Drag and Drop“ means to select the items, hold down the mouse and
    15·1 answer
  • Networks, partnerships, and joint ventures are an example of
    7·1 answer
  • Stress is an illness not unlike cancer.<br> True<br> False
    6·2 answers
  • As you continue to build the help desk, you want to ensure that all of the tools are in place and that the analysts have the too
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!