1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SVETLANKA909090 [29]
4 years ago
10

What is the first thing a host does when attempting to communicate with a remote device (not on the same subnet)? (Note: Assume

that communication is via IP address.)
Computers and Technology
1 answer:
liberstina [14]4 years ago
5 0

Answer:

The first thing the host does is to look for the MAC address of the default router(gateway).

Explanation:

The network address and the MAC address play very crucial roles when there is a need to send packets from one network to another i.e across different networks since every device knows, at least, the IP address of it's default gateway.

<em>Hope this helps!</em>

You might be interested in
A user may enter some text and the number of times (up to a maximum of 10) to repeat it. Display the text repeated that many tim
DerKrebs [107]

The command that would be given to execute a code that asks for input and runs it repeatedly until it has satisfied the condition is a do-while loop.

<h3>What is a Do While Statement?</h3>

This is a conditional statement that is used in programming to run a set of code and check the conditions set and commands to execute and finally terminates when the conditions are satisfied.

Therefore, based on the fact that a loop would be used, and the displayed text would be repeated many times, the do-while loop would be used for this program.

Read more about do-while statements here:

brainly.com/question/13089591

#SPJ1

6 0
2 years ago
What does network administration normally include? Check all of the boxes that apply.
Paul [167]

Answer: design of the network

security for the network

documentation

identifying and fixing issues

Explanation: I just took the test

8 0
4 years ago
What tag would you enter to link the text “White House" to the URL<br> http://www.whitehouse.gov?*
astra-53 [7]

Answer:

3.<a href="http://www.whitehouse.gov" target="_blank">White House</a>

Explanation:

The exact question is as follows :

To find - What tag would you enter to link the text “White House" to the URL

http://www.whitehouse.gov with the destination document displayed in a new unnamed browser window?

1.<a ="http://www.whitehouse.gov" target="_blank">White House</a link>

2.<a href="ftp://www.whitehouse.gov" target="_blank">White House</a>

3.<a href="http://www.whitehouse.gov" target="_blank">White House</a>

4.<link="http://www.whitehouse.gov" target="_blank">White House</link>

The correct option is - 3.<a href="http://www.whitehouse.gov" target="_blank">White House</a>

4 0
3 years ago
You are writing an email to a potentional employer about a job opportunity. What can you do to make sure the email reflects your
Lina20 [59]
You want to use proper etiquette and be polite, do not call them by their first name and always refer to them as Mr., or Mrs. Use an extended vocabulary and do not talk about yourself.  If you have proper grammar, depending on the job, that can be seen as intelligence. And always use an appropriate closing that is respectful. Such as, Sincerely, John Doe.
4 0
4 years ago
Read 2 more answers
Which Azure service should you use to correlate events from multiple resources into a centralized repository?
Trava [24]

Answer:

D. Azure Log Analytics

Explanation:

The Azure service we can use when you have to correlate events from more than 1 sources into a repository which is centralized you have to use Azure Log Analytics.

it is a special surrounding for Azure monitor log data.Each workspace has their own repository and configuration.

Hence we conclude that the answer to this question is option D Azure Log Analytics.

6 0
3 years ago
Other questions:
  • Consider the following page reference string:
    12·1 answer
  • What's the best way to change the font size of all your notes pages at once?
    14·2 answers
  • Describe how an attacker can use whois databases and the nslookup tool to perform reconnaissance on an institution before launch
    8·1 answer
  • 9
    10·1 answer
  • Will technology be the destruction or salvation of human-kind
    13·2 answers
  • What are some things you can do to clean up your digital footprint.
    9·1 answer
  • QN, 3. Write the working principle of computer.<br>​
    8·1 answer
  • Select the education and qualifications that are most helpful for Insurance Services careers. Check all that apply.
    14·2 answers
  • How do you delete your brainly account
    6·1 answer
  • On the worksheet, make cell a1 the active cell and then simultaneously replace all occurrences of the value 0. 05 with the value
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!