1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kykrilka [37]
3 years ago
11

THE PROTOCOL ORIGNALLY RAN ON TOP OF NETBT,BUT today runs by itself and uses port 445?

Computers and Technology
1 answer:
Artist 52 [7]3 years ago
7 0
You are talking about the Server message Block (SMB) protocol in Windows 2000/XP

with port 445, we can use direct tcp/ip networking without the need of NETbios layer which will make better communications between nodes on a network


You might be interested in
Compare and contrast the properties of a centralized and a distributed routing algorithm. give an example of a routing protocol
Naily [24]

Answer and Explanation:

Centralized : Central node in the system gets whole data about the system topology, about the traffic and about different hubs. This at that point transmits this data to the particular switches. The benefit of this is just a single hub is required to keep the data. The hindrance is that if the focal hub goes down the whole system is down, for example single purpose of disappointment.

Distributed: Distributed nodes gets data from its neighboring hubs and afterward takes the choice about what direction to send the parcel. The weakness is that if in the middle of the interim it gets data and sends the parcel something changes then the bundle might be deferred.

Example :

Link State takes Centralized approach

Distance Vector takes Decentralize approach

8 0
3 years ago
A vast global network that is made up of many smaller interconnected networks is known as:
Galina-37 [17]

The answer is The Internet.   It is a vast global network that is made up of many smaller interconnected networks. It connects to millions of computer units world wide, in which any computer can communicate with any other computer as long as they are both connected to the Internet. It also made access to information and communication easier.

6 0
4 years ago
Read 2 more answers
Taking a suitable example in c language explain the of call by value and call by reference concepts.
Degger [83]

Answer: The difference between call by value and call by reference is that in call by value the actual parameters are passed into the function as arguments whereas in call by reference the address of the variables are sent as parameters.

Explanation:

Some examples are:

call by value

#include <stdio.h>  

void swap(int, int);

int main()

{  int a = 10, b= 20;

 swap(a, b);

 printf("a: %d, b: %d\n", a, b);

}  

void swap(int c, int d)

{

 int t;

 t = c; c = d; d = t;

}  

OUTPUT

a: 10, b: 20

The value of a and b remain unchanged as the values are local

//call by reference

#include <stdio.h>

 void swap(int*, int*);

 int main()

{

 int a = 10, b = 20;

 swap(&a, &b);   //passing the address

 printf("a: %d, b: %d\n", a, b);

}

void swap(int *c, int *d)

{

 int t;

 t = *c; *c = *d; *d = t;

}

OUTPUT

a: 20, b: 10

due to dereferencing by the pointer the value  can be changed which is call by reference

8 0
4 years ago
You are the network administrator for a company and you want to separate the traffic from the accounting department from the res
vichka [17]

Answer:

internetwork

Explanation:

According to my research on information technology, I can say that based on the information provided within the question the type of network that should be implemented is called an internetwork. This refers to interconnecting different types of networks to build a large, global network" such that any pair of connected hosts can exchange packets.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

3 0
3 years ago
after installing a secondary hard drive what needs to be done to the hard drive and what do these two task do?
elena55 [62]
HEY heheh ehehhegeeh
3 0
4 years ago
Other questions:
  • A program called the ______ combines the object program with other programs in the library and is used in the program to create
    5·1 answer
  • What is the difference between the new and open commands on the file menu
    12·1 answer
  • How to create a tender statement in database management?
    5·1 answer
  • What is a type of destructive program?
    8·2 answers
  • Use of the Internet for e-government has increased. Identify the benefits by checking all of the boxes that apply.
    8·1 answer
  • Which of the following is the most accurate definition of a botnet? a small text file passed to a Web browser on a user's comput
    15·1 answer
  • Write a statement that takes a variable named file_object that contains a file object and reads its contents into a Python list
    7·1 answer
  • Consider the following static method.
    9·1 answer
  • Select the correct answer.
    8·1 answer
  • Lucy is trying to decide what sources to use in her literature review. The type of sources Lucy will use in her literature revie
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!