1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stella [2.4K]
4 years ago
13

What happens when two computers have the same IP address?

Computers and Technology
1 answer:
icang [17]4 years ago
6 0

Answer:

The answer is "Option A"

Explanation:

An IP address is an entire web interface or local wireless address, that enables a device, which is related by online interaction to be recognized by some other networks, if two computer system IP address is same, it ensures, that a slot can not be allocated to an interface where the frame is transmitted 16 times without another collision, it is abandoned a frame, that can't clarify conveyed, and classified as a collision, which is unnecessary.

  • In option B, It may be interpreted for a certain function from, that source, but replication or dissemination is prohibited from all formats.
  • In option C, The IP address can't crash the servers.
  • In option D, It can't provide slow connectivity.
You might be interested in
An online conference room reservation system lets a user reserve rooms. The user is required to enter contact information and re
lisov135 [29]

Answer:b)Reserve Room, Enter Contact Information, Enter Reservation Detail

Explanation: The use case is described as actors , actors goal, usage of use cases, units of scope and initial point and terminating point of use cases .

The situation mentioned in the question will take place for the reservation of the room through the instances in the form like filling the contact details for the identification , filling out reservation information as well for getting the knowledge about the room requirement by the person.

These details help in reaching out the particular person if required, number of days he wants to book the room,any extra facility he would like to have etc. After these detail filling activity the room can be reserved successfully.Thus , the most appropriate option is option (b).

Other options are incorrect because room reservation cannot be done without any formality as mentioned in the question and entering contact detail and reservation detail one by one.

7 0
3 years ago
Write the definition of a function named alternator that receives no parameters and returns true the first time it is invoked, r
Nataly [62]

Answer:

The solution code is written in C++

  1. bool STATUS = true;
  2. bool alternator ()
  3. {
  4.    if(STATUS){
  5.        STATUS = false;
  6.        return true;
  7.    }else{
  8.        STATUS = true;
  9.        return false;
  10.    }
  11. }

Explanation:

We need a global variable to track the status of true or false (Line 1).

Next, create the function alternator (Line 2) and then check if current status is true, set the status to false but return the previous status boolean value (Line 5-6). At the first time of function invocation, it will return true.

The else block will set the STATUS to true and return the false (Line 7-9).

3 0
3 years ago
Below is a list of 32-bit memory address references, given as word addresses.
Maru [420]

For a direct mapped cache the general rule is: first figure out the bits of the offset (the right-most bits of the address), then figure out the bits of the index (the next-to right-most address bits), and then the tag is everything left over (on the left side).

One way to think of a direct mapped cache is as a table with rows and columns. The index tells you what row to look at, then you compare the tag for that row, and if it matches, the offsettells you which column to use. (Note that the order you use the parts: index/tag/offset, is different than the order in which you figure out which bits are which: offset/index/tag.)

So in part (a) The block size is 1 word, so you need 0 offset bits (because <span><span><span>20</span>=1</span><span><span>20</span>=1</span></span>). You have 16 blocks, so you need 4 index bits to give 16 different indices (because <span><span><span>24</span>=16</span><span><span>24</span>=16</span></span>). That leaves you with the remaining 28 bits for the tag. You seem to have gotten this mostly right (except for the rows for "180" and "43" where you seem to have missed a few bits, and the row for "181" where you interchanged some bits when converting to binary, I think). You are correct that everything is a miss.

For part (b) The block size is 2 words, so you need 1 offset bit (because <span><span><span>21</span>=2</span><span><span>21</span>=2</span></span>). You have 8 blocks, so you need 3 index bits to give 8 different row indices (because <span><span><span>23</span>=8</span><span><span>23</span>=8</span></span>). That leaves you with the remaining 28 bits for the tag. Again you got it mostly right except for the rows for "180" and "43" and "181". (Which then will change some of the hits and misses.)

5 0
3 years ago
Read 2 more answers
Compare AES to DES. For each of the following elements of DES, indicate the comparable element in AES or explain why it is not n
Setler79 [48]

Answer:

See explaination for the comparison

Explanation:

Comparison Of AES & DES:

DES(Data Encryption Standard)

​In DES the data block is always been divided into two of the halves.

It works on the Feistel Cipher Structure.

The plaintext is of the 64 bits.

DES has 16 rounds in it.

The rounds that are in DES are as follows:

Expansion

Permutation

XOR

S-box

P-box

Swap

DES has a smaller key which is less secure as compared to AES

In speed, the DES is comparatively slower.

AES(Advanced Encryption Standard)

​In AES the entire data block is always processed as a single matrix.

It works on the principle of substitution and permutation.

The plaintext in AES varies from 128 bits ,192 bits, 256 bits, etc.

AES has a larger key size as compared to the DES.

There are many variations to the rounds in AES and is dependent on the bits of the encryption.They are as follows: 128-bits algorithm consists of 10 rounds. 192-bits algorithm consists of 12 rounds. 256-bits algorithm consists of 14 rounds.

The names for the rounds are as follows:

Subbytes

Shiftrows

Mix Columns

AddRoundkeys.

AES is having large secret key comapratively to the DES which is more secure.

Comparing the speed for the encryptions AES is faster than DES.

a.) AddRoundKey

b.) Since AES is not Feistel cipher this step is not essential.

c.) ByteSub is there.

d.) ShiftRow and MixColumn

e.) No swaping of halves

4 0
3 years ago
What would be the most constructive response
natima [27]

Answer:

we cant tell what your talking abt please repost with at pitcher or a exolination

Explanation:

3 0
3 years ago
Other questions:
  • Nadia would like to find text in her current document that differentiates CompanyABC from companyabc. Which option should she us
    8·2 answers
  • Choosing firm goals for your business
    7·2 answers
  • A(n ____ enables a database administrator to define schema components.
    10·1 answer
  • You can access various sites on the WWW by using hyperlinks or by______. A. entering a key word for your search B. following dir
    12·2 answers
  • Question 2Write a MIPS assembly implementation of the following C/C++ code. Assume small, unsigned integer arithmetic (no range
    10·1 answer
  • If a function doesn’t return a value, the word _________ will appear as its return type.
    6·1 answer
  • A group of developers for a startup company store their source code and binary files on a shared open-source repository platform
    14·1 answer
  • A question to determine your ability to use the reference materials effectively. Your boss has determined that you will be using
    9·1 answer
  • Which position most commonly runs routes in order to catch a pass?.
    10·1 answer
  • What action requires a UV map?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!