Ou have just set up a network that will use the tcp/ip protocol, and you want client computers to obtain ip configuration automatically. which type of server do you need for this?

Answers

Answer 1
DHCP (Dynamic Host Configuration Protocol)

Related Questions

Proprietary file types are easily displayed in Word documents, Web pages, etc.
Question 15 options:

True


False

Answers

it should be true :)

Answer:

It is true

Explanation:

I took the test

David’s gross pay is $450, and his total deductions were $49. What is his net pay?

Answers

the net pay is the gross pay after deductions so his net pay would be 401 dollars
His net pay would be $401. 
This is the answer because $49 was the amount of the total deductions from his gross pay. 
$450 - $49 = $401.
So $401 is the correct answer.

List three considerations when you choose memory.

Answers

1)How many memory cards (how many can you computer hold)
2)Company (some companies run better than others)
3)Amount of memory (xGb)

What type of file system is used by sdxc memory cards?

Answers

Answer:

ExFAT

Explanation:

A: Required: Create and delete file of the programs are a. process control b. file management ... question_answer Q: 350. __________ is used to shift processes so they are contiguous

The area that holds all the instructions the computer needs to start up when it is powered on is ________. the cpu rom ram the usb

Answers

ROM (Read Only Memory)

Name two purposes of creating a microsoft account for use in visual studio 2015

Answers

Creating a Microsoft account for use in Visual Studio 2015 means that you will get a better and optimized user experience, with several benefits.
Some of the purposes why you should create an account are:
1. free software, training and support from Visual Studio and broad range of benefits
2. synchronized Visual Studio Settings, which means that you will have for example the same layout, window and color theme, or whatever you select in the settings, every time you log in with your account


Which option enables you to keep the last grammatical change

Answers

To keep last grammatical change in a word processor, one should look for the "Undo" or "Ctrl+Z" option.

How do we use it in word processor?

In most word processors like Goo/gle Docs, we can simply press "Ctrl+Z" or select the "Undo" option from the menu to revert the last grammatical change you made. This feature allows to quickly correct any mistakes or undo changes that you may have made unintentionally.

Its helps for maintaining the correctness and clarity of your documents. So, if we want to preserve the last grammatical we will use the "Undo" function in the word processing software.

Read more about grammatical change

brainly.com/question/33472332

#SPJ1

Assuming you are using the sun sdk, what command would you type at the operating system command prompt to compile the program labassignment.java?

Answers

Assuming javac is on the PATH variable:

javac labassignment.java

Otherwise, it would have to be:

/path/to/javac labassignment.java

The main reason to use a visual aid in a presentation is to

a ensure concepts are more challenging to understand.
b make a challenging concept easier to understand.
c guarantee that complex information is accurate.
d keep an audience’s attention through distraction.

Answers

D keep the audiences attention through distraction

Answer:

d keep an audience’s attention through distraction.

Explanation:

Advantages of Visual Aids in a Presentation:

A picture is worth a thousand words - presentation softwares let you display images and videos that help prove the speaker's theses. By using graphics to show trends or using photographs to showcase a product, the speaker helps the audience better visualize (and therefore understand) what he or she tells you.Appeals to many senses - While oral speech mainly stimulates hearing, the use of multimedia tools stimulates other senses, especially vision. To see is to feel. And for some auditoriums that makes all the difference: Have you ever wondered why tradeshow vendors insist on permanently repeating demonstrations without forgetting the videos that explain the benefits of their products?Greener and more versatile support - Multimedia presentations save paper: a single presentation can be seen by all members of the auditorium without photocopying. On the other hand, they allow greater creativity and originality in the presentation of contents when compared to paper.Easy content creation - Multimedia tools allow you to quickly and simply dress up and embellish the speaker's ideas and make them visually appealing. In fact, no Visual Design course is required to make captivating slides.

What would happen if computers only had input peripherals and a CPU?

A. Computers would process and display data.
B. Computers would receive signals and display data.
C. Computers would receive signals and process data.
D. Computers would receive signals, process, and print data.

Answers

Assuming it has all the correct inputs and a CPU it would only be able to receive signals via the input and process that data. There are no display outputs or printer so the answer is probably C.

What would happen if computers only had input peripherals and a CPU is that: C. Computers would receive signals and process data.

A computer can be defined as an electronic device that is designed and developed to receive data in raw form as an input and then processes these data into an information (output) that could be used by an end user.

Basically, the main part of a computer include the following;

Central processing unit (CPU): this is the brain of a computer and it does all the processing and logical control.Input devices (peripherals): keyboard, mouse, scanner, etc.Output devices (peripherals): printer, monitor, speaker, etc..Motherboard.Memory and storage device: random access memory (RAM) and read only memory (ROM).

Hence, if a computer only has input peripherals and a central processing unit (CPU) it would receive signals and process data respectively.

Find more information: https://brainly.com/question/17402566

A right turn should be from the right lane into the right lane of the roadway entered. True or false. A. True B. False

Answers

it depends if it's America or another continent but assuming it's America I would say A.True

After a worksheet has been displayed in page layout view, page breaks are indicated by ________ in normal view.

Answers

After a worksheet has been displayed in page layout view, page breaks are indicated by dotted lines in normal view. Typical view for used for creating and viewing presentation slides is called normal view and is also known as slide view. Which offers a full size view of a slide, making it easier to create a slide.

What is the difference between a syntax error and a logical error?

Answers

A syntax error can be a simple mistake as a typo or an extra space. A logical error has to do with the code structure, and if it makes sense.

Hope this helps!

Which are types of online resources that students can use for help? Check all that apply.

Answers

What are the choices ?

Answer:

A, B,E.

have a great day

import static java.lang.System.*;
import java.util.Scanner;

public class Sales{

//you haven't learned about "static" yet but take it on faith that it is needed
//we'll discuss in future classes what it actually means and why you need it
//create a private static variable for price
//create a private static variable for discountRate - it's an integer
//create a private static variable for tax


// the sale method takes in no parameters
// there are 3 print satements and the method returns the final sale price
public static double sale(){

//write your code here. Use the Word doc example as a guide to what the print statements
//should look like. Don't forget the "return" statement.

}

/*
*The main method is what is executed when the "run" button is clicked.
*It is necessary, in this case, for the program to be tested.
*Actually study this code and trace through it to see how the Scanner is used to assign
* values to the variables. Also pay attention to the use of print, println and \n to cause the
* output to be formatted the way it is in the example.
*/

public static void main(String[] args){
Scanner kb = new Scanner(System.in);
System.out.print("Please enter a price: ");
price = kb.nextDouble();
System.out.println(price + "\n");
System.out.print("What is the tax rate? ");
tax = kb.nextDouble();
System.out.println(tax);
discountRate = (int)(Math.random() * 40);
System.out.println("Result returned is " + sale());
}
}




Can anyone help with this

Answers

First you add the three static variables as instructed:

    private static double price;
    private static int discountRate;
    private static double tax;

Then you implement the sale() method:

public static double sale(){
    System.out.printf("Price before discount: %.2f\n", price);

    double sale = price * (1-(double)discountRate/100.0);
    System.out.printf("Price after discounting %d%% but before tax: %.2f\n", discountRate, sale);

    sale *= (1+tax/100.0);
    System.out.printf("Discounted price with %.1f%% tax added: %.2f\n", tax, sale);

    return sale;
}

I kind of took a stab at how to calculate the sale. Not sure if the tax has to be added before or after the discount. But I'm sure you can fix that if needed.

In spreadsheet software, use ____ to create meaningful data summaries to analyze worksheets containing large volumes of data.

Answers

In spreadsheet software, use pivot tables to create meaningful data summaries to analyze worksheets containing large volumes of data.

Hard disk storage technology can be classified as ____ storage.

Answers

Persistent (between boots) or permanent.

When reassembling your pc what does the text recommend as the first step?

Answers

When reassembling your PC the first step is to wear an anti shock bracelet to ground yourself from the electricity. Then take a Philips head screwdriver and take the machine apart. Typically the hard drive is taken out first and then the RAM.

What is the purpose of using modulo 2 arithmetic rather than binary arithmetic in computing an fcs?

Answers

Final answer:

The purpose of using modulo 2 arithmetic in computing an FCS is to detect transmission errors through simple and efficient calculations. It provides a checksum that can be used to verify data integrity, detecting common errors like single-bit and burst errors. This method does not require handling carry operations, simplifying implementation.

Explanation:

The purpose of using modulo 2 arithmetic in computing a Frame Check Sequence (FCS) is to provide error detection capability when data packets are transmitted over a network. Modulo 2 arithmetic is a simple, efficient method of calculating a type of checksum that can be used to verify the integrity of the transmitted data. By performing bitwise exclusive OR (XOR) operations on the data bits, modulo 2 arithmetic generates a value that can be appended to the data. When the data is received, the same operations are performed, including the FCS. If the result is zero, it is assumed that the data has not been corrupted during transmission.Modulo 2 arithmetic is used because it resembles binary addition without carry. It simplifies the hardware or software implementation since handling carry operations is not required. Also, modulo 2 arithmetic can detect common errors such as single-bit errors and burst errors that can occur in communication channels, providing a simple yet robust way to ensure data integrity. This method is commonly used in network protocols, for example, in the Cyclic Redundancy Check (CRC).

Which of the following definitions describes a receptacle ground fault circuit interrupter (GFCI)? A. Includes an extension cord B. Protects a worker by increasing the duration of an electrical shock C. Protects users from ground faults when someone connects electrical equipment to a GFCI protected outlet D. Replaces a circuit breaker on the main circuit board Suspend Assessment

Answers

C. Protects users from ground faults when someone connects electrical equipment to a GFCI protected outlet

A web application server that is compromised in a cross-site scripting attack is said to be

Answers

Cross-site scripting attack ( XSS ) occurs when malicious script are injected into web sites. An attacker uses web application to send malicious code.
Answer:
A web application server that is comprised in a cross-site scripting attack is said to be B. injected.     

Spreadsheet software creates a ____, composed of a grid of columns and rows

Answers

Spreadsheet software creates a worksheet, composed of a grid of columns and rows.

To research scholarly information for her history project, Lucy should most likely visit a

a .com website.
b .edu website.
c .gov website.
d .org website.

Answers

Answer: The correct answer is choice b, a .edu website.

Explanation: In order to research scholarly information for her history project, Lucy should most likely visit a .edu website. Websites that end in .edu are normally educational institutions, which which be the most likely to contain scholarly articles.

To research scholarly information for her history project, Lucy should most likely visit a .edu website. The correct option is b.

What is a website?

A web page (or webpage) is a World Wide Web hypertext document. A web server serves up web pages to the user, which are then displayed in a web browser.

A website is made up of several web pages that are linked together by a common domain name.

The world wide web is made up of all of the websites put together. The website can be of various types, such as an e-commerce website, a social media website, or a blog website, and each website serves a different purpose, but they all have several linked web pages in common.

When choosing a domain name, one of the top-level domain names that can be used is "edu." It generally refers to the domain name's owner as a four-year college or similar educational institution.

Thus, the correct option is b.

For more details regarding a website, visit:

https://brainly.com/question/19459381

#SPJ6

To get a sense of your digital footprint, you should: Question 2 options: Google yourself regularly, and monitor what your friends post, in case they've posted something about you Google yourself once a year Google yourself every five years Delete all of your accounts and start fresh

Answers

Let us examine the given answers.

a) Google yourself regularly, and monitor what your friends post.
  Verdict: This answer is correct, but it is also necessary to look for yourself on other search engines.

b) Google yourself once a year
  Verdict: Once a year is better than doing nothing, but more than once a year is preferable.

c) Google yourself every five years.
  Verdict: The time interval is too long. Your reputation could easily be damaged, or your identity could be stolen in less than 5 years.

d) Delete all your accounts and start fresh.
   Verdict: This will not solve the problem of having your reputation damaged, or having your identity stolen. Information on the web is preserved ins storage vaults for long periods of time.

Answer: 
Google yourself regularly, and monitor what your friends post. Also, search for your name on other search engines.

Using Word, Maureen is writing an outline of a presentation she plans to give to her company. She will be showing a video during the presentation, and she would like to place images of isolated video frames in her outline so that she remembers exactly what to talk about when the corresponding part of the video is played to her audience. Which tool would be best for Maureen to place these images in Word, and why?

Answers

A copy and paste would be fastest and easiest. As you can pinpoint the exact location to where you want the picture to be. 

Answer:

The tool that would be best for Maureen to place the image in Word is the Screen Clipping tool because it allows to pick a window that is opened in the device and insert the screenshot of it in the document.

Explanation:

The screen clipping tool allows you to take a screenshot of a window that is opened in the device and add it to the document in which you are working.

To use it you have to click on the part of the document where you want to put the image and click on the insert tab and then, screenshot. After this, you will see the windows that are opened and you can choose the screenshot you need or select a part of it. Then, the image is added to the document. According to this, the tool that would be best for Maureen to place the imagen in Word is the screen clipping tool.

When you tell a computer what to do, you are providing input?

Answers

True: Input is the command which we give it to the computer to perform a certain task.

In other words, A computer is an electronic machine that processes information, it takes in raw information (or data) at one end, stores it until it's ready to work on it, chews and crunches it for a bit, then spits out the results at the other end. All these processes have a name. Taking in information is called input, storing information is better known as memory (or storage), chewing information is also known as processing, and spitting out results is called output

What motivates engineers to make tcp/ip packets more independent?

Answers

The TCP/IP model has four layers: application, host-to-host layer, internet layer and network access layer.  
TCP is the transmission protocol that is used and it is connection-oriented.
IP stands for Internet. 
A stream of bytes is broken into segments and reconnected at the other end. The packets are retransmitted whatever is lost and the segments are organized might in the correct order. 
The boom of new different applications that should be interoperable motivates engineers to make tcp/ip packets more independent.

The name of an array stores the ________ of the first array element

Answers

address. The equivelent of array[ 0 ].

Attacks that take place against web based services are considered to be what type of attack?

Answers

cyber attack is correct

To connect multiple usb devices to a single usb port, a ____ can be used.

Answers

USB hubs can be used in this situation. These hubs typically have four to six USB ports, and can thereby allow the connection of more devices than the typical one-to-one connection that a standard USB port will give. This allows the user to expand the number of devices that the computer can read at any one time.
Other Questions
What functional feature(s) does the phosphate group contribute to the structure of a phospholipid? select all that apply. select all that apply. nonpolar group that avoids water negative charge to interact with water place to attach fatty acids place where bonds can form between adjoining phospholipids place to attach another small charged molecule? In writing an element's symbol the first letter is always ________________ and the second letter is ____________________. A) capitalized, capitalized B) not capitalized, capitalized C) capitalized, not capitalized D) not capitalized, not capitalized Please help me with this graphing problem How might Earths surface change as tectonic plates continue to move? Daniel has decided to open his own bakery using locally sourced ingredients and supplies. he provides income and jobs to local suppliers. he also provides his community with a place to buy delicious baked goods. this is an example of What produces most of the energy a cell needs to carry out its functions? the higher the temperature of the air in the oven the faster the cake will bake Enid got a job through an employment agency that charges a fee equal to 40% of the rst ve weeks pay. The job pays $315 per week. How much does Enid have to pay the employment agency? A bone that contains a diaphysis and epiphyses, a tuberosity near its proximal end, and proportionally more compact than spongy bone is the ________. radius first rib talus clavicle fibula Jefferson Davis frequently clashed with his Cabinet in the Confederate government. Why? how can you quickly calculate 20 percent of any bill amount? Find the area of triangle. Dale finished a puzzle in 6 minutes. How many seconds is this? The formula for a trapezoid relates the area A, the two bases, a and b, and the height, h.Solve for a. The Earth's systems are all independent which means that what is one benefit and one limitation of comparative investigations Which of the following lines contain examples of anaphora? Select all that apply.Come weep with me; past hope, past cure, past help!Despised, distressed, hated, martyr'd, kill'd!Most lamentable day, most woeful day, / That ever, ever, did I yet behold!My daughter he hath wedded: I will die, / And leave him all; life, living, all is Deaths. 14-9x=-8(10+x) slove and show check Rhinestone Cowboy Dreadlock Holiday MacArthur Park Total Republican B 33 C 90 Democrat A 24 34 E Total 61 D 53 171 Which of the following can be determined from the table above? A. 2004-06-03-06-00_files/i0290000.jpg B. 2004-06-03-06-00_files/i0290001.jpg C. 2004-06-03-06-00_files/i0290002.jpg D. 2004-06-03-06-00_files/i0290003.jpg how do constructive and destructive forces contribute to the rock cycle Steam Workshop Downloader