answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zarrin [17]
2 years ago
7

To verify if all the IP addresses of a network are being used by computers that are up and running, you can use a port scanner t

o perform what procedure on a range of IP addresses?
Computers and Technology
1 answer:
nataly862011 [7]2 years ago
3 0

Answer: Ping

Explanation Ping is an abbreviation for Packet Internet Groper is a networking beneficial program or a tool which is used to test if a particular host is can be accessible . It helps in checking if your computer is connected to a server this is done by sending data packet to a server and if it receives a data packet back, then you have a connection.

You might be interested in
Cleo finds herself frequently searching for messages from particular senders or with specific subjects. What should she create
blsea [12.9K]

Answer:

The element she can create to increase efficiency for these searches is:

Search Folder

Explanation:

The reasons behind this are that index in the first place indexes by themselves don't facilitate the job of looking quickly at a certain e-mail. Because they show the user all of them. Second, outlook rules are certain guidelines that the user can program to group certain emails and send them to certain folders. However, they don't play a crucial part in quick searches. We have two options that could make this: instant search of folder search. Instant search works by general categories, of emails, events, and contacts. But search folders give the user certain characteristics the emails can have so the user can choose which emails to see. Thus, this is the correct answer.

8 0
2 years ago
1. PGP encryption can be performed from the command line as well. What is the PGP command line syntax to encrypt the my-message.
bekas [8.4K]

Answer:

1. From the command prompt, type:

pgp --encrypt "my-message.txt" --recipient "Sean" --output "secret-message.txt.gpg"

2. Press Enter.

Explanation:

From the command line, the above command is entered and Enter is pressed.

The command start with pgp, then it has different options:

--encrypt: this specifies the input file to be encrypted

--recipient: this specifies the specific user to which the file is been encrypted

--output: this specifies the name to which the output (encrypted file) is saved.

8 0
2 years ago
The base class Pet has private fields petName, and petAge. The derived class Dog extends the Pet class and includes a private fi
Lapatulllka [165]

Answer:

Hello attached is the Java program written to solve the problem

The Pet.java and Dog.java files are unaltered

Explanation:

The input and output  codes are attached as well i.e the second image is the input while the third image is the output code

5 0
2 years ago
c++ You are given an array A representing heights of students. All the students are asked to stand in rows. The students arrive
Lilit [14]

The below code will help you to solve the given problem and you can execute and cross verify with sample input and output.

#include<stdio.h>

#include<string.h>

 int* uniqueValue(int input1,int input2[])

 {

   int left, current;

   static int arr[4] = {0};

   int i      = 0;

     for(i=0;i<input1;i++)

      {

         current = input2[i];

         left    = 0;

         if(current > 0)

         left    = arr[(current-1)];

      if(left == 0 && arr[current] == 0)

       {

       arr[current] = input1-current;

       }

       else

   {

       for(int j=(i+1);j<input1;j++)

       {

           if(arr[j] == 0)

           {

               left = arr[(j-1)];

               arr[j] = left - 1;

           }

       }

   }

}

return arr;

}

4 0
2 years ago
3.A customer has a system with a Gigabyte B450 Aorus Pro motherboard. He wants to upgrade the processor from the AMD Athlon X4 9
Burka [1]

Answer:

The upgrade is possible and it will yield a remarkable  increase in performance

Explanation:

It is a newer product, there is tendency of having a better application compatibility/performance

It has much higher multi threaded performance which is around 522% higher. This allows for higher performance in professional applications like encoding and heavy multitasking compared to the previous.

When considering gaming, it has higher performance compared to the previous.

5 0
2 years ago
Other questions:
  • Represent decimal number 8620 in (a) BCD, (b) excess-3 code, (c)2421 code, and (d) as a binary number
    7·1 answer
  • Which of the following is true about simulation games? A. Simulation games involve competing in a sport against other players. B
    10·2 answers
  • Jail and prison officials may generally limit inmate rights when the limitations serve
    13·2 answers
  • Letitia is in high school. She wants to go to medical school in Kentucky and then become a pediatric surgeon to help children. W
    5·2 answers
  • The X.500 standard defines a protocol for a client application to access an X.500 directory known as which of the following opti
    10·1 answer
  • All of the following are specific security challenges that threaten corporate systems in a client/server environment except:
    14·1 answer
  • Based on virtualization technologies, how many types can we classify them? Please give a brief statement on each of them?
    14·1 answer
  • A spreadsheet keeps track of student scores on all the exams in a course. Each row of the spreadsheet corresponds to one student
    14·1 answer
  • Explain working principle of computer?​
    13·1 answer
  • To create a public key signature, you would use the ______ key.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!