1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Talja [164]
3 years ago
6

You are employed as a network administrator at Widget. The Widget network is TCP/IP based. You have been instructed to configure

Dynamic Host Configuration Protocol (DHCP) on Widget’s network.What steps would you follow?
Computers and Technology
1 answer:
wolverine [178]3 years ago
7 0

DHCP operations fall into four phases: server discovery, IP lease offer, IP lease request, and IP lease acknowledgement. These stages are often abbreviated as DORA for discovery, offer, request, and acknowledgement.

Explanation:

  • DHCP provides reliable IP address configuration, while reducing network administration.
  • Discovery : The DHCP client broadcasts a DISCOVER message on the network subnet using the destination address or the specific subnet broadcast address.  A DHCP client may also request its last known IP address
  • Offer :When the server receives a DISCOVER message from a client, which is an IP address lease request, the DHCP server reserves an IP address for the client and makes a lease offer by sending a OFFER message to the client.
  • Request : In response to the DHCP offer, the client replies with a REQUEST message, broadcast to the server,[a] requesting the offered address.
  • Acknowledge : When the DHCP server receives the REQUEST message from the client, the configuration process enters its final phase. The acknowledgement phase involves sending a ACK packet to the client.
You might be interested in
What are the modes of operation of WLANs?
Nimfa-mama [501]

Answer:

WLAN's or Wireless LAN Units have 2 main modes of operation

Explanation:

The Two Main modes of Operation are the following

<u>Infrastructure Mode:</u> in this mode the main WLAN unit becomes the main connection point in which all devices are connected to and the main unit provides an internet connection to all the devices connected to it.

<u>Ad Hoc Mode:</u> in this mode devices transfer data from one another back and forth without permission from a base unit.

Some WLAN units will also include 2 extra modes of operation called Bridge and Wireless Distribution System (WDS).

<u>Bridge Mode:</u> this mode allows the base unit to act as an intermediary and bridge two different connection points. Such as bridging a wired connection with a wireless one.

<u>WDS Mode:</u> this mode uses various access points to wirelessly interconnect devices to the internet using repeaters to transmit connections. It can provide internet to both wired and wireless clients.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
4 years ago
Which type of app is the best choice when it is critical to be able to use the device's features but performance is not critical
lisov135 [29]

Answer:

Hybrid.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are; planning, analysis, design, development (coding), testing, implementation and execution, and maintenance.

Some of the models used in the software development life cycle (SDLC) are;

I. A waterfall model: it can be defined as a process which involves sequentially breaking the software development into linear phases. Thus, the development phase takes a downward flow like a waterfall and as such each phase must be completed before starting another without any overlap in the process.

II. An incremental model: it refers to the process in which the requirements or criteria of the software development is divided into many standalone modules until the program is completed.

III. A spiral model: it can be defined as an evolutionary SDLC that is risk-driven in nature and typically comprises of both an iterative and a waterfall model. Spiral model of SDLC consist of these phases; planning, risk analysis, engineering and evaluation.

Basically, softwares are categorized into three (3) main categories based on the development platform and these are;

a. Web application.

b. Native application.

c. Hybrid application.

A hybrid application is a type of software application that is designed based on the combination of the elements of both web applications and native applications.

Typically, a hybrid application is a web application that is developed in a native application shell, using a standardized web programming language such as CSS, JavaScript, and HTML.

Generally, a hybrid application avails a programmer the opportunity to write a code for a mobile application once while accommodating or being compatible with multiple app platforms such as Android, Windows, iOS, etc.

Hence, a hybrid application is the best choice of an application when it's critical for the end users to be able to use the features associated with a device such as a mobile phone but performance isn't critical.

4 0
3 years ago
A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
uysha [10]

Answer:

Security Tab is the correct answer.

Explanation:

The Security Tab will enable the users to authorize anyone to use that file or directory.Many clients deleted the security tab because After that nobody can alter the security privileges on the device.

  • With the help of the Security tab, we will minimize the ActiveX attacks on Internet Explorer. This option is available in the Internet Options of the dialog box.
  • Other options are incorrect because they are not related to a given scenario.
8 0
3 years ago
Which of the following describes a decision support system (DSS)?
levacccp [35]

Answer:

B.

Explanation:

8 0
3 years ago
Read 2 more answers
Design a 16K x 8 memory using the following ICs:
Montano1993 [528]

Answer:

Required memory size is 16k x 8

16k = 24 x 210 = 214

Hence, No. of address lines = 14

No. of data lines = 8

a) Size of IC 1024 x 1

Total number of ICs required = 16k x 8 / 1024 x 1 = 16 x 8 = 128

b) Size of IC 2k x 4

Total number of ICs required = 16k x 8 / 2k x 4 = 8 x 2 = 16

c) Size of IC 1k x 8

Total number of ICs required = 16k x 8 / 1k x 8 = 16 x 1 = 16

Explanation:

For a, 10 address lines from A0 to A9 are used to select any one of the memory location out of 1024 memory locations present in a IC.

For b, 11 address lines from A0 to A10 are used to select any one of the memory location out of 2k=2048 memory locations present in a IC.

For c, 10 address lines from A0 to A9 are used to select any one of the memory location out of 1k=1024 memory locations present in a IC.

3 0
3 years ago
Other questions:
  • You bought a monochrome laser printer two years ago. The printer has gradually stopped feeding paper. Which printer component sh
    14·1 answer
  • . A register in a computer has a of bits. How many unique combinations can be stored in the register?
    5·1 answer
  • What customization feature can you use to create a cohesive look and feel for your presentations
    5·1 answer
  • Universal Containers maintains Job information in a Custom Object that contains sensitive information. The only users who should
    6·1 answer
  • These icons cannot be removed from the Dock. Finder e-mail music player Trash
    14·1 answer
  • Edhesive 3.4 practice 1
    9·1 answer
  • Smart art can be used to create that highlight relationships between two items
    14·1 answer
  • Which of the following is not the disadvantage of closed
    7·2 answers
  • (b) Cell B12 contains the formula, ROUND((SUM(B5:B9)*D1),1).
    15·1 answer
  • Do you trust machine learning application?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!