1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ale4655 [162]
3 years ago
6

You have installed a streaming video service on your network. You want selected hosts to be able to access this service via a dy

namically assigned class D IP address. What do you need to configure?
Computers and Technology
1 answer:
vitfil [10]3 years ago
6 0

You can add the MAC addresses of hosts that you want to allow the access in a database, if you are working on a large scale, and then compare the MAC address of the user in you network wall and allow th users that are allowed.

Or if you are working on a small scale then in your program you can save the MAC in an array or model class and compare when the user will access.

You might be interested in
When did internet came to existence?
Luden [163]
1982 the Internet protocol was introduced as the standard network protocol on the ARPANET.

1981 access to the ARPANET was expanded.
7 0
3 years ago
what would happen if a large number of computer users are attempting to access a web site at the same time that you are
jasenka [17]
It would slow down the whole network if your on the same one

6 0
3 years ago
Read 2 more answers
You are asked to write a program that will display a letter that corresponds with a numeric rating system. The program should us
Mice21 [21]

Answer:

rate

Explanation:

6 0
3 years ago
How does a router handle a packet destined for a network that is not listed in the routing table?
kogti [31]
The packet is dropped or discarded. By default, a router will send packets to a network that has been listed in the routing table. If it happens that the network is not listed, the packet will be discarded or dropped. Packets that do not have a default route or gateway of last resort are dropped.

 






5 0
3 years ago
The list below represents the contents of a computer's main memory. I've left every other byte blank. Assume that the letters at
inysia [295]

Answer:

3) A Single linked list is a sequence of elements in which every element has link to its next element in the sequence.

DATA LINK

DATA stores actual value , LINK stores address of next node

As per information given in question, letters at the even addresses are items in linked list and the odd addresses will be used as links.

Even Address Odd Address

12 (Stores 't') 13 (Used as link)

14 (Stores 'm') 15 (Used as link)

16 (Stores 'a') 17 (Used as link)

18 (Stores 'r') 19 (Used as link)

20 (Stores 's') 21 (Used as link)

Numbers represented by circle are addresses of respective nodes. Here Front or Head has address 16. Which represents the Head Node.

Following image represents the word "smart" with respective nodes and their addressing.

​

Numbers represented by circle are addresses of respective nodes.

The head pointer is: 20

7 0
3 years ago
Other questions:
  • A hacker changing the ip addresses used in conjunction with a particular company’s web site to re-route them to the hacker’s ser
    11·1 answer
  • A job posting is the best way to find out what _____ are required for a position.A.aptitudes B.hard skills C.soft skills D.dress
    10·2 answers
  • Which strategy are you using when you only read the title, section headings, and captions?
    12·2 answers
  • Google Slides saves your work to Google Drive. PowerPoint has the option to save to OneDrive. Both of these solutions are in the
    9·1 answer
  • What happens if i receive a text while my phone is off?
    15·1 answer
  • Get these points why they hot!!!!!!!!!!!!!!!!!!!!
    14·2 answers
  • Choose a film you have watched, or watch a film you have wanted to. Write a film review in at least three paragraphs. Describe w
    5·1 answer
  • Do you think that distributed OSs use a process-communication technique different from that used by desktop OSs?
    13·1 answer
  • A timer is set after each frame is sent before waiting an ACK for that frame, how long does the timer take to be expired?
    10·1 answer
  • To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!