1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ale4655 [162]
3 years ago
6

You have installed a streaming video service on your network. You want selected hosts to be able to access this service via a dy

namically assigned class D IP address. What do you need to configure?
Computers and Technology
1 answer:
vitfil [10]3 years ago
6 0

You can add the MAC addresses of hosts that you want to allow the access in a database, if you are working on a large scale, and then compare the MAC address of the user in you network wall and allow th users that are allowed.

Or if you are working on a small scale then in your program you can save the MAC in an array or model class and compare when the user will access.

You might be interested in
2a
zmey [24]

Answer:

See explaination

Explanation:

2a)

A hacker group hacked into the Bay Area Rapid Transit system, this was done to protest BART’s shut down of wireless communication in some BART stations. Such attacks is done mostly to stand for some situation which happened previously. Hence, we can say it is a form a hacktivism. It was not ethical as it disrupted the system for some time.But this is also a form of protest which is been done by some group of peoples.

2b)

If a foreign government launches a hacking attack, it can be considered a war.

If this type of attack happens then the repercussions may result to the war.

2c)

We gave an analogy between merchants accepting some amount of shoplifting, on the one hand, and merchants and credit card companies accepting some amount of credit card fraud, on the other hand.

THe streght so called can be pointed out as the money is rolling in the market and the business keeps on going.

The weakness can be described as the loss which is being incurred by the company.

7 0
3 years ago
Complete the sentence.
Artemon [7]

Answer:

encrypted

Explanation:

to prevent others from viewing it

4 0
3 years ago
Read 2 more answers
Choose the correct function to yield the shown result.
HACTEHA [7]

Answer:

int

Explanation:

Correct on edg test 2021

8 0
3 years ago
To activate Spelling and Grammar check using the ribbon, navigate first to the _____ tab
ipn [44]
I believe you would click on the Auto Correct Tab
7 0
4 years ago
Read 2 more answers
Repl.it Assignment 4.1.3 (Max and Min)<br> Please help me<br> I will give brainliest and a like
earnstyle [38]
-31 or 21- 50 it may also carry -31
3 0
4 years ago
Other questions:
  • Which syntax error in programming is unlikely to be highlighted by a compiler or an interpreter? a variable name misspelling a m
    6·2 answers
  • which of the following are used on cable trays to protect the cable insulation from direct sunlight? a. barrier strips b. solid
    5·1 answer
  • How has the development of personal computer hardware and software reversed some of the trends brought on by the industrial revo
    15·1 answer
  • Divide (10x^3 + 19x^2 + x - 7) by (5x + 2)​
    11·1 answer
  • In preparing his persuasive presentation, Reza should most likely focus on clearly presenting his
    6·2 answers
  • What is the value of the cost variable after the following code snippet is executed? int cost = 82; if (cost &lt; 100) { cost =
    15·1 answer
  • Uploading Your Work
    14·1 answer
  • List an example of application software used in spreadsheet​
    11·2 answers
  • Who when and why developed python​
    9·2 answers
  • State five differences between selecting and highlighting ​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!