205 Answered Questions for the topic networking (computer)
07/21/25
What’s the difference between a vulnerability, an exploit, and a threat?
These terms come up a lot in cybersecurity, and they seem kind of similar. Can someone explain the actual difference between a vulnerability, an exploit, and a threat?
07/21/25
How does multi-factor authentication actually work behind the scenes?
I know MFA makes accounts more secure, but I don’t really get what’s going on technically. What’s happening in the background when I enter a code or use a device to log in?
07/21/25
How can I tell if a website is safe to visit?
Sometimes I’m not sure if a site is legit or if it might be dangerous. What are the main signs that a website is safe to click on and use?
Networking (computer)
06/07/25
Networking inquiry regarding the ping command
What protocol does ping use?
Networking (computer)
05/10/25
What does /30 means in Networking?
Please try give me an answer for networking and explain how many host can I get from /30
Networking (computer)
02/08/25
security network quesion
An example of something the individual possesses that can be used in a users identity is " typing rhythm" A. True B. False
Networking (computer) Computer Science
03/18/24
Show the initial routing tables for each of the nodes u, v, x, y, and z.
Consider the network shown in Figure 2. Initially, each node only knows the costs of the links to each of its own neighbors. Based on the distance-vector algorithm, show the initial routing...
more
Networking (computer) Computer Science
03/18/24
Computer Networking Questions and Understandings
(a) Suppose you connect two unconnected nodes with a new link. Does the link cost between thetwo nodes increase or decrease?(b) Will the count-to-infinity problem occur if we decrease the cost of a...
more
Simple Ai Calc Customer CAre Number 91×8629964274(☎️)08629964274/Contact
Simple Ai Calc Customer CAre Number 91×8629964274(☎️)08629964274/Contact Simple Ai Calc Customer CAre Number 91×8629964274(☎️)08629964274/Contact Simple Ai Calc Customer CAre Number...
more
Networking (computer) Computer Science
01/29/24
Networking Protocol Questions Regarding Agent and Mail Server
What protocols are used when (i) the sender’s agent communicates with the sender’s mailserver(ii) the sender’s mail server communicates with the receiver’s mail server, and (iii) the receiver’s...
more
01/17/24
Computer Network Throughput
Suppose Alice wants to send a 200 kB file to Bob as a single message. The path from Alice to Bobhas three links of transmission rates: R1 = 2 Mbps, R2 = 500 kbps, and R = 1 Mbps.(a) Assuming no...
more
01/17/24
Computer Network Throughput
Suppose Alice wants to send a 200 kB file to Bob as a single message. The path from Alice to Bobhas three links of transmission rates: R1 = 2 Mbps, R2 = 500 kbps, and R = 1 Mbps.(a) Assuming no...
more
01/14/24
Transmission and Propagation Delays: Suppose s = 2.5 × 10^8 meters/sec, L = 3000 bytes, and R = 10 Mbps. Find the distance m so that dprop = dtrans.
Suppose s = 2.5 × 10^8 meters/sec, L = 3000 bytes, and R = 10 Mbps. Find the distance m so that dprop = dtrans. Explain how I can do step by step. Thanks!
Networking (computer)
12/14/23
what is networking?
The 165 Project Company is setting up a new headquarters in Downtown Springfield. As such, they need to set up a network of publicly available services on that network. Please read the rest of the...
more
Networking (computer) C++
09/26/23
I have a C++ problem, i am dealing with a server client AES encyrption assignment and I have been tasked with filling in this function stub?
Function stub: // Send a message to the server,using the common format for secure messages,// then take the response fromthe server, decrypt it, and returnit・////// Many of the messages in our...
more
Networking (computer) Computer Science
09/09/23
IP address is 192.135.250.180/24, the network administrator of the company wants you to divide the printer's network into 30 subnets.
(1) What is the new IP of the printer in CIDR form? For this particular subnet, what is its possible IP range, from its network IP to broadcasting IP?(2) How many hosts can connect in each new...
more
08/31/23
True or false computer introduction
a. Applications requiring complex, sophisticated mathematical calculations use mainframesb. Instead of the term, port, the term, connector, sometimes is used to identify audio and video ports
Networking (computer) Dreamweaver
07/09/23
I need to learn to use filezilla and dreamweaver to edit remote web files.
I've used filezilla and dreamweaver for editing files that live on a remote server, but the combination is no longer working. Filezilla either crashes or does not load the file requested into...
more
What Combinations Apply RISC-V
A nested function calls another function (plot_function with parameter a0) and is also called by another function. Given the code that follows RISCV calling convention, which sets of registers...
more
Assembly and RISC-V Calling Convention
A nested function calls another function (plot_function with parameter a0) and is also called by another function. Given the code that follows RISCV calling convention, which sets of registers...
more
03/06/23
How do I join the desktop client to the Domain in windows 10?
Rename windows 10 to DESKTOP1-XX use your initials in place of xx
Join a workstation to the domain
a. Join DESKTOP1-XX to the u0123456.corp b. on DC1 move DESKTOP1-XX object in Active directory...
more
Networking (computer)
02/22/23
Routing Protocols on ad-hoc networks?
With ad-hoc networks booming in cars, drones and the like... How do these decentralized nodes work without a router? What are the routing protocols, and why care about them?
Networking (computer)
02/14/23
Setting up firewalls
Discuss the setup of firewalls, user access controls, host logging, network filtering, intrusion detection and prevention, and encryption at any level. Why do we need firewalls, IDS, NIDS or HIDS?
Networking (computer)
02/08/23
How can I move my iCloud photos and videos to OneDrive
My iCloud 100 GB storage is 80% full but I have 1 TB of storage with OneDrive and 200MB remaining with Google Drive. Microsoft OneDrive seems to have better organization of photos and videos than...
more
Networking (computer)
01/28/23
Data communication errors
Explain how a network administrator knows whether there is one parity check error per day or 10,000 errors.
Still looking for help? Get the right answer, fast.
Ask a question for free
Get a free answer to a quick problem.
Most questions answered within 4 hours.
OR
Find an Online Tutor Now
Choose an expert and meet online. No packages or subscriptions, pay only for the time you need.