1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
solniwko [45]
3 years ago
6

100BaseT network uses the TCP/IP protocol suite exclusively, and workstations on your network obtain addresses dynamically from

a server. From your computer, you can contact all servers and workstations on your own network segment, but you are unable to gain access to network resources on other segments. Which factors should you investigate
Computers and Technology
1 answer:
klio [65]3 years ago
7 0

Answer:

The two factors are:

  • The default gateway
  • The routers

Explanation:

<u>Default gateway:</u>

  • The default gateway transmits individual information back and forth between the network. This is most consumers and commercial workplaces seem to be a router whereby channels communication from either the local area network to something like the cables or Cellular networks that transfer that one to the broadband service.

<u>The routers:</u>

  • A router would be the first safety boundary from even being intruded into a channel. Order to enable the highest possible level of device public safety eventually turns such as the proxy server into something.
You might be interested in
What is the largest computer file size, megabyte , gigabyte, terabyte
STatiana [176]

The terabyte is the largest computer file size because it has 1024 gigabytes each of which has 1024 megabytes. Therefore, the the terabyte can be subdivided into megabytes or gigabytes.

3 0
3 years ago
Read 2 more answers
How can I crack a computer password?
Irina18 [472]
Try to use easy passwords first like the persons birthday fav color etc then move on to harder passwords
7 0
3 years ago
I will make you brainless just answer all this question!!​
Taya2010 [7]

Answer:

I have make this question please answer this

Explanation:

#carryonlearning

8 0
3 years ago
Which of the following documents specifies the uptime guarantee of a web server?A. Due processB. Due diligenceC. Scope of workD.
Harrizon [31]

Answer: D) Service Level Agreement.

Explanation: A service Level Agreement, also known by the acronym SLA, is a written agreement between a service provider and its customer in order to set the agreed level for the quality of such service. The SLA is a tool that helps both parties reach a consensus in terms of the level of service quality, in aspects such as response time, time availability, available documentation, personnel assigned to the service, among others.

6 0
3 years ago
Create a single line comment that says ""Print results to screen""
levacccp [35]

Answer:

//""Print results to screen""

Explanation:

In c,c++,java,javascript // is used for the single line comment.

syntax:- // comment.

Whatever text that is followed after // is commented means this line will not get executed by the compiler.

Comments are used to explain the code to other person who is working on the code or trying to understand that code.

6 0
3 years ago
Other questions:
  • Pls help............
    9·2 answers
  • Where do you go to create a workbook?​
    8·1 answer
  • A(n) ____________ specifies a variable's name and data type.
    5·2 answers
  • What function is the responsibility of the network layer?
    10·1 answer
  • Question # 1
    5·1 answer
  • Parts of a Computer
    13·2 answers
  • They will wash the car change into tag question​
    6·1 answer
  • HTML code to display square bullets in an unordered list​
    7·1 answer
  • D&gt; Windows is the most popular for ​
    11·1 answer
  • Suppose Uber was considering a new algorithm to recommend ride destinations in the app. Which type of research strategy should t
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!