examine the multicast and broadcast packets that you captured, looking at the details of the source and destination addresses. most likely one has the broadcast ethernet address, as broadcast frames tend to be more common than multicast frames. look at a broadcast frame to see what address is used for broadcast by ethernet. expand the ethernet address fields of either broadcast or multicast frames to see which bit is set to distinguish broadcast/multicast or group traffic from unicast traffic. answer the following questions: 1. what is the broadcast ethernet address, written in standard form as wireshark displays it? 2. which bit of the ethernet address is used to determine whether it is unicast or mul-ticast/broadcast?
suppose you are given a timetable, which consists of the following: a set of airports, and for each airport , a minimum connecting time a set of flights, and the following, for each flight : origin airport destination airport departure time arrival time . describe an efficient algorithm for the flight scheduling problem. in this problem, we are given airports and , and a time , and we wish to compute a sequence of flights that allows one to arrive at the earliest possible time in when departing from at or after time . minimum connecting times at intermediate airports should be observed. what is the running time of your algorithm as a function of and ?
the device that acts as a connection point between computers and can filter and forward data to a specified destination is called a(n)
you are the security administrator for your organization's active directory forest. you have implemented a ca hierarchy using windows server 2016 servers. you need to make sure that you can restore your cas and their databases in the case of a server failure. what should you do?
1. consider a tcp connection between host a and host b. suppose that the tcp segments traveling from host a to host b have source port number 12345 and destination port number 23456. what are the source and destination port numbers for the segments traveling from host b to host a?
every department can now edit their own portion of the university's web site. the editing software prevents someone from editing another department's content and also permits authorized editors to edit only a portion of the department's pages. this kind of software is called what?
which is the final step in the crm process? group of answer choices developing crm programs identifying the target customers analyzing data implementing programs constructing a data warehouse
an hr supervisor has asked the cloud administrator to check the log files to find out when a particular employee logged off the system on the previous day. which goal of iam does this satisfy?
write a user-defined function, called reverser, that takes a string, s, as input and returns a string that is that one in reverse.
the data processing method used by fedex to track packages is an example of group of answer choices real-time processing. batch processing. online batch processing. real-time batch processing.
why can virtual machine (vm) sprawl become a problem? select all that apply. question 4 options: programmers can lose access to the original code. bottlenecks begin to appear on servers. a rogue virtual machine makes you vulnerable to security risks. crashes occur because system resources are low. vmware ceases to work when sprawl becomes too great. idle virtual machines automatically shut themselves down. licensing liabilities might emerge.
now that you provided her with the average donation amount, tayen decides to invite 50 people to the grand opening of a new community garden. you return to your new donor list spreadsheet to determine how much each donor gave in the past two years. you will use that information to identify the 50 top donors and invite them to the event. what syntax adds the contribution amounts in cells o2 and p2? select all that apply
listen to exam instructions you are the administrator for a linux server. following best practices for system security and effective administration, you always log in to the system with a standard non-root user account. you only elevate your privileges to root user level when you need to do an administrative task. what do you enter at the command prompt that will, by default, switch you to the root user and require you to enter the root password?
write a function ispalindrome(s) which takes a string s as input, and returns true if the string is a palindrome, and false otherwise.
the default provision of the uniform commercial code (ucc) is that, unless otherwise specified, title to goods being sold passes when: