205 Answered Questions for the topic networking (computer)

Networking (computer) Computer General Computer C++

09/09/20

-Need the pseudo code and the flowchart. -answer part 3 for the question which is two essays!

here is the code for the program.-Need the pseudo code and the flowchart.-answer part 3 for the question which is two essays!C++ code:#include <iostream>using namespace std;#include... more
Networking (computer) Math Computer Science

09/06/20

Convert the following dotted decimal IP address into binary? 60.231.159.202

Convert the following dotted decimal IP address into binary?60.231.159.202
Networking (computer) Math Computer Science

09/06/20

Express the following 48-bit binary MAC address in hexadecimal? 11111100 – 01111110 – 10001011 – 11010110 – 00110101 – 10011010

Express the following 48-bit binary MAC address in hexadecimal?11111100 – 01111110 – 10001011 – 11010110 – 00110101 – 10011010
Networking (computer) General Computer C++ Computer Programming

09/06/20

NEED ANSWER FOR PART 3

NEED ANSWER FOR PART 3
Networking (computer)

08/24/20

number of bits used by ipv6 address

08/23/20

I want to ask about an sql injection vulnerability. I did't find a way to exploit it.

I wanna know if vulnerability really exists if it exists if it is exploitable. Zap tool give me some info like this.... ' | case randomblob(10000000) when not null then'''' else '''' end But i can'... more

07/24/20

knowledge in “code of ethics’”

Refer to the guide “ACM Code of Ethics and Professional Conduct” (https://www.acm.org/code-of-ethics)Based on your understanding from this guide, relate and then suggest any 5 FIVE guidelines of... more
Networking (computer) General Computer Computer Science

07/01/20

Briefly explain the roles of instruction Registers and Program counter

Briefly explain the roles of instruction Registers and Program counter

05/07/20

Need help with this

What are the important steps in developing a VPN policy?
Networking (computer)

05/06/20

What is a WAN ?

Networking (computer)

05/02/20

Please help with this! Computer security question

Where should a "deny all catch all" rule be positioned and why? also what is a quasi vpn?

05/02/20

What is this and why

What is a deny all and catch all rule and why is it positioned at the end of the list

05/01/20

What does this mean

define VPN operational management process

04/15/20

Write the SQL queries

HAPPY INSURANCE Database... more
Networking (computer)

04/01/20

What's the Difference between TCP and IP protocols ?

Please help as soon as possible
Networking (computer) General Computer

03/03/20

Why does your internet speeds fluctuate or get slower over time?

Networking (computer) Network Android

02/26/20

My question is why I have 7 ports open on my phone numbers of ports open 33769,3381,345651,34722,33601,45536

My question is why I have 7 ports open on my phone numbers of ports open 33769,3381,345651,34722,33601,45536
Networking (computer)

02/07/20

Data networks question

Designing a medium to large network requires a combination of technologies and there isn’t one “right way.” Think about the technologies you would need to deploy to implement a college campus... more
Networking (computer)

02/03/20

What default reference bandwidth does OSPF use when calculating the metric?

Question 11 options: A) 100 Mbps B) 100 Gbps C) 10 Mbps D) 1 Gbps
Networking (computer)

02/03/20

Which Cisco IOS command is used to alter the maximum number of equal-cost OSPF routes that are inserted into the routing table?

Question 10 options:A) ospf maximum-paths maxB) ospf-paths maxC) ospf load-balance maxD) maximum-paths max
Networking (computer)

02/03/20

Which Cisco IOS command is used to alter the default behavior and configure all interfaces as passive?

Question 9 options:A) ip routing passive-interfaceB) ip routing passive enableC) passive-interface defaultD) passive-interface default disable
Networking (computer) Internet

01/27/20

Every time you log onto the internet, visit websites, or use social media, companies are tracking and recording information about you. What degree of privacy do you deserve?

Information privacy is a huge issue in our world today. Every time you log onto the internet, visit websites, or use social media, companies are tracking and recording information about you. Should... more
Networking (computer)

01/18/20

microfundamentals

Why is it important to document the lines of a batch program and how might you do that and why should you?

12/05/19

please I need some help with java code

inheritance 1. Write a program represent the following class hierarchy 1.1. Person class a) which contain the following attributes: - Name Address .Gender -DateOfBirth b) And contain the following... more
Networking (computer) General Computer

11/28/19

How to download videos from Osmosis.org?

I'm trying to download videos which the stream online on Osmosis.org, but the problem is the videos are segmented as .TS files and there's no .m3u8 playlist in developer tool (these were... more

Still looking for help? Get the right answer, fast.

Ask a question for free

Get a free answer to a quick problem.
Most questions answered within 4 hours.

OR

Find an Online Tutor Now

Choose an expert and meet online. No packages or subscriptions, pay only for the time you need.