1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yuradex [85]
3 years ago
15

I exist on the data link layer of the OSI model. I discover IPv4 addresses associated with private networks. I also map network

addresses to physical hardware, like the MAC address of a router. What protocol am I?
Hypertext Transfer Protocol (HTTP)
Address Resolution Protocol (ARP)
Internet Control Message Protocol (ICMP)
Dynamic Host Configuration Protocol (DHCP)
Computers and Technology
1 answer:
Charra [1.4K]3 years ago
3 0
Dynamic host configuration protocol
You might be interested in
How do most database users perform data searches?
defon

Answer:

by using forms

Explanation:

Most of the database users perform the data searches by using the forms. A form can be used to enter, edit and display the data from the data source. Its a user interface in fact that fetches the data from the database. Reports have used the display the data for a certain type of user, and the viewing table does not look feasible to search from a very large database, and the databases are usually large. No calculation is required for searching the data, and we only need to write queries in the right syntax. Hence, here the correct option is by using forms.

7 0
3 years ago
Your bank offers to lend you $114,400 at an 8.5% annual interest rate to start your new business. The terms require you to amort
wlad13 [49]

Answer: The amount of interest to be paid is $972

Explanation: This is gotten by firstly getting the amount of money to return per year without the interest which is $114400/10(years)= 11440

11440 is to be paid per year without interest. To get amount of interest is $11440*8.5/100 = $972 this is the amount of interest to be paid per year including in year 2.

Therefore, total amount of money together with interest to be paid each year and in year 2 = $11440+$972=12412.

3 0
4 years ago
Define a lambda function that accepts one argument (a list of strings) and returns a list of only the words that start with an '
Grace [21]

Answer:

  1. def Lambda(strList):
  2.    return list(filter(lambda s: (s.startswith("e")), strList))
  3. print(Lambda(["meaning", "cart", "engine", "egg"]))

Explanation:

The solution code is written in Python 3.

Lambda function is an anonymous function. It is a function without any name and it is started with keyword lambda. To write a lambda function to filter the string started with an 'e', we can write a lambda expression, s.startswith("e") that work on one input strList. If any word from strList started with letter "e", the word will be added into a list generated by filter function. At the end, the Lambda function will return the list of strings as output.

When we test the Lambda function using the sample string list (Line 4), we shall get ['engine', 'egg'] printed to terminal.

8 0
3 years ago
Which image property helps to create distinction between the highlights and shadows of an object?
Nutka1998 [239]
I know filters, so I know it is Saturation.
6 0
3 years ago
Read 2 more answers
A user is having trouble signing in to the domain from a computer that has been out of service for several months, and nobody el
Pepsi [2]

Answer:

To solve the problem, first,

a) The computer account should be reset.

b) Deactivate the computer from the domain.

c) Then, rejoin it to the domain.

Explanation:

A domain is a network that  allows different computers to function and operate from a common server. A domain may or may not be protected by a password. Setting up a domain provides additional security thereby blocking other computer networks from having access to it. When a person is experiencing difficulties in logging into a domain, there are certain things to be done to resolve the issue.

First, reset the computer account.

Secondly, deactivate the computer from the domain.

Third, Rejoin it back to the domain.

5 0
3 years ago
Other questions:
  • Write a for loop to print all elements in courseGrades, following each element with a space (including the last). Print forwards
    7·1 answer
  • What was the attitude of the U.S. Senate towards the Treaty of Versailles, and why did they have that attitude?​
    9·1 answer
  • 2.1. The stream cipher described in Definition 2.1.1 can easily be generalized to work in alphabets other than the binary one. F
    10·1 answer
  • Each row in a database is a set of unique information called a(n) (A.)table,(B.)record,(C.)object,(D.)field
    12·2 answers
  • Allie is working on the development of a web browser and wants to make sure that the browser correctly implements the Hypertext
    7·1 answer
  • **NEED HELP??!! Computer Science Questions!! KNOWING GIMP!!!!
    7·1 answer
  • Recall that in C++ there is no check on an array index out of bounds. However, during program execution, an array index out of b
    9·1 answer
  • What are price comparison websites?
    6·1 answer
  • Post back maintains view state by assigning the form values to a hidden form field named ____.
    12·2 answers
  • a radio frequency identification (rfid) tag provides a generic identification for a credit or debit card carrying the tag.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!