1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
snow_tiger [21]
3 years ago
13

When the tcp\ip translates a network layer address into a data link layer address (after not finding an entry for the network la

yer address in its data link layer address table in the cache) , it sends a special _____________ to all computers in the subnet?
Computers and Technology
1 answer:
Pavel [41]3 years ago
6 0
When the network stack translates an IP address (network address) to a MAC address (data link address) it sends a broadcast using ARP to all devices on the subnet asking who has the specified IP address.  The device with that IP address will then respond with it's MAC address to the ARP message's source.

With this in mind the answer to your question would either be broadcast or ARP request depending on what you have been learning in class.
You might be interested in
Consider your lab assignment when reviewing the following code that will be placed in the CopyingJeroo class: public void atFlow
Mice21 [21]

Answer:

The image would be created on the second island and removed from the first island.

3 0
4 years ago
Which of the following is not true about primitive data types.
SVEN [57.7K]

Answer:

The point 2 is incorrect as Primiticve data types are immutable

Explanation:

3 0
3 years ago
State two ways of preventing virus attack on a computer.​
Goshia [24]

Answer:

updating the computer and having an anti virus on your computer

5 0
3 years ago
Advanced Sounds is engaging in a full upgrade of its Windows Server 2003 network to Windows Server 2008. The upgrade includes us
Lynna [10]

Answer:

cs

Explanation:

5 0
3 years ago
Write the importance of Data and software Security​
matrenka [14]

Answer:

Data security is when protective measures are put in place to keep unauthorized access out of computers, websites, and databases. This process also provides a mechanism for protecting data from loss or corruption.

Explanation:

please make me brainiest if it helps you

6 0
3 years ago
Other questions:
  • Which of the following tasks requires software? A Writing a paper on the history of Aztec sun godsB Creating a photo collage for
    9·1 answer
  • What are comments meant to do?
    12·1 answer
  • Given an array of n distinct integers,d = [d[0], d[1],.., d[n - 1]], and an integer threshold, t, how many (a,b,c) index triplet
    11·1 answer
  • Write the C++ if statement that compares the contents of the quanity variable to the number 10. If the quantity variable contain
    12·1 answer
  • Write a python program stored in file extra_credit.py that takes three different inputs from the user where : First Input: The p
    7·1 answer
  • What is the advertising photographer’s main objective in creating an image?
    11·1 answer
  • Save As .csv .html Worksheet tab Format Cells SUM Function Destination cell Home tab AutoFit A. Applies a border or shading to s
    6·1 answer
  • ______ is a slow process that takes place in nature. (2 points)
    8·1 answer
  • Most of the revenue that magazine companies generate comes from?
    8·2 answers
  • ***URGENT***
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!