1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
solniwko [45]
3 years ago
6

100BaseT network uses the TCP/IP protocol suite exclusively, and workstations on your network obtain addresses dynamically from

a server. From your computer, you can contact all servers and workstations on your own network segment, but you are unable to gain access to network resources on other segments. Which factors should you investigate
Computers and Technology
1 answer:
klio [65]3 years ago
7 0

Answer:

The two factors are:

  • The default gateway
  • The routers

Explanation:

<u>Default gateway:</u>

  • The default gateway transmits individual information back and forth between the network. This is most consumers and commercial workplaces seem to be a router whereby channels communication from either the local area network to something like the cables or Cellular networks that transfer that one to the broadband service.

<u>The routers:</u>

  • A router would be the first safety boundary from even being intruded into a channel. Order to enable the highest possible level of device public safety eventually turns such as the proxy server into something.
You might be interested in
which of these is a placeholder in a document into which variable data is inserted during the process of a mail merge?
Margarita [4]

Answer: C. Merge Field.

The Merge Field is a placeholder that holds the variable data that will be inserted into the main document during a mail merge procedure. The columns in a document may represent the categories of information. The Rows represent the records of the different columns. The computer counts a row of data to be a single record.

7 0
3 years ago
Read 2 more answers
Given a following C program, where M and N are constant declared with #define long P[M][N]; long Q[N][M]; long sum_element(long
sladkih [1.3K]

Answer:

Check the explanation

Explanation:

The first, second and third instruction together set %rdx = 3*%rdi + %rsi. The fourth and fifth instruction set %rdi = %rdi+9*%rsi.

Now %rdi is used to address Q, while %rdx is used to address P. Note that P is addressed by column and then by row. Hence M = 3 . Also Q is addressed by row and then column, hence N = 9 .

3 0
4 years ago
Can web sites contain copyright material? <br> Yes <br> No
Maru [420]
Yes they can contain copyright
6 0
3 years ago
Read 2 more answers
Difference between RAM and CPU
frozen [14]

The main difference between the RAM and the CPU is the roles they play in a computer. The CPU is the actual part that does the computing while the RAM only holds the data.

4 0
4 years ago
When two files are linked together, the __________ file receives the data from another workbook.?
Ket [755]
When two files are linked together, the <u>d</u><span><u>estination </u></span>file receives the data from another workbook.

If i'm not wrong.

3 0
3 years ago
Other questions:
  • Dinah is using an I.D.E to write, modify, and save code. Which tool should she use?
    8·2 answers
  • Which sentence in the passage conveys the message that drones can be used in the study of history?
    11·2 answers
  • An administrator has noticed that GPO containing new update settings has not yet applied to one of the computers on the network.
    5·1 answer
  • How to solve 3(x - 2) = 9x<br><img src="https://tex.z-dn.net/?f=3%28x%20-%202%29%20%3D%209x" id="TexFormula1" title="3(x - 2) =
    14·1 answer
  • I want an A! Write a pseudocode algorithm that asks the user for their grades in CSE 1321, along with their attendance, then cal
    11·1 answer
  • Clicking this would navigate among different worksheets
    14·1 answer
  • Tim is creating a page to display his poker club’s set of rules. He has main categories and subcategories along with about a par
    12·1 answer
  • Suppose end system A wants to send a large file to end system B. At a very high level, describe how end system A creates packets
    9·1 answer
  • Fill in the blank: In a Word chart, text that describes the data represented in a chart and that is typically displayed on the r
    15·1 answer
  • A(n) ________ is the portion of virus code that is unique to a particular computer virus. A) virus signature B) encryptio
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!