If you have implemented a network where hosts are assigned specific roles such as for file sharing and printing. Other hosts access those resources but do not host services of their own. what type of?

1 Answer

Answer :

What is the answer ?

Related questions

Description : Find out the components of DHCP: 1) A protocol that delivers host-specific configuration parameters from a server to a host. 2) The client determines its own hardware address; this is normally in a ROM on the hardware. 3) ... or permanent network addresses to hosts. A. 1,2 B. 1,3 C. 2,3 D. 1,2,3

Last Answer : B. 1,3

Description : Which among the following definitions is correct: a) Address - The unique number ID assigned to one host or interface in a network b) Subnet - A portion of a network sharing a particular subnet address c) ... to the host d) Interface - A network connection e) None of These f) All of the Above

Last Answer : f) All of the Above

Description : Which among the following definitions is correct: a) Address - The unique number ID assigned to one host or interface in a network b) Subnet - A portion of a network sharing a particular subnet address c) ... to the host d) Interface - A network connection e) None of These f) All of the Above

Last Answer : f) All of the Above

Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.

Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic

Description : What is the benefit of the Networking? A. File Sharing B. Easier access to Resources C. Easier Backups D. All of the Above

Last Answer : D. All of the Above

Description : In TCP/IP Reference model, the job of ............... layer is to permit hosts to inject packets into any network and travel them independently to the destination. (A) Physical (B) Transport (C) Application (D) Host-to-network

Last Answer : Answer: Marks to all

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : In the network 200.10.11.144/27, the fourth octet (in decimal) of the last IP address of the network which can be assigned to a host is ________ a. 158 b. 255 c. 222 d. 223

Last Answer : a. 158

Description : A subnet has been assigned a subnet mask of 255.255.255.192. What is the maximum number of hosts that can belong to this subnet? a. 14 b. 30 c. 62 d. 126

Last Answer : c. 62

Description : Which of the following layer protocols are responsible for user and theapplicationprogrammesupport such aspasswords, resource sharing, file transfer and network management? A. Layer 7 protocols B. Layer 6 protocols C. Layer 5 protocols D. Layer 4 protocols E. None of the above

Last Answer : Layer 7 protocols

Description : Niche overlap indicates (a) mutualism between two species (b) active cooperation between two species (c) two different parasites on the same host (d) sharing of one or more resources between the two species.

Last Answer : (d) sharing of one or more resources between the two species.

Description : To prevent unauthorized access to and / or from the network, a system known as ......., can be implemented -Technology

Last Answer : To prevent unauthorized access to and / or from the network, a system known as Firewall, can be implemented by hardware and / or software.

Description : Which among the following is correct: a) A firewall is a system designed to prevent unauthorized access to or from a private network. b) Firewalls can be implemented in both hardware and software or a combination of both. c) Both of Above d) None of these

Last Answer : c) Both of Above

Description : How many user roles may each GCSS-Army user be assigned in an?

Last Answer : Multiple user roles, depending upon the user's level ofresponsibility

Description : Point out the correct statement. a) Virtual machines are containers that are assigned specific resources b) Applications need not be mindful of how they use cloud resources c) When a developer ... a cloud service, the developer cannot attach to the appropriate service d) All of the mentioned

Last Answer : Virtual machines are containers that are assigned specific resources

Description : Point out the correct statement. a) Virtual machines are containers that are assigned specific resources b) Applications need not be mindful of how they use cloud resources c) When a developer ... uses a cloud service, the developercannot attach to the appropriate service d) All of the mentioned

Last Answer : Virtual machines are containers that are assigned specific resources

Description : An intermediate host is a. Where parasite asexual cycle occurs. b. Always a nonhuman host c. Where parasite sexual cycle occurs. d. The human host between two other animal hosts.

Last Answer : a. Where parasite asexual cycle occurs.

Description : ……….. is a computer which provides sharing the resources of other computers connected in a network. -Technology

Last Answer : Serveris a computer which provides sharing the resources of other computers connected in a network.

Description : who are your favorite radio hosts? what qualities make for a good talk-show radio host?

Last Answer : Ira Glass ( This American Life) Bob Bolen ( All Songs Considered)

Description : All of the following statements concerning the actinomycetous filamentous soil bacterium Frankia are correct except that Frankia (a) can induce root nodules on many plant species (b) can fix ... its host plant through root hair deformation and stimulates cell proliferation in the host's cortex

Last Answer : (b) can fix nitrogen in the free-living state

Description : The address of a class B host is to be split into subnets with a 6-bit subnet number. What is the maximum number of subnets and the maximum number of hosts in each subnet? a. 62 subnets and 262142 hosts. b. 64 subnets and 262142 hosts. c. 62 subnets and 1022 hosts. d. 64 subnets and 1024 hosts

Last Answer : c. 62 subnets and 1022 hosts.

Description : DHCP stands for……………………………….. A. Dynamic Host Control Protocol B. Diskless Hosts Control protocol C. Diskless Hosts Configuration protocol D. Dynamic Host configuration Protocol

Last Answer : D. Dynamic Host configuration Protocol

Description : As a general rule, tapeworms require a. Two Hosts. b. A Fish Host. c. Only A Human Host. d. No Host At All.

Last Answer : a. Two Hosts.

Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none

Last Answer : large numbers of users direct access to the computer for problem solving

Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none

Last Answer : 1) large numbers of users direct access to the computer for problem solving

Description : A System in which a transaction access and updates a file quickly enough to affect the original decision making is called 1) Real time system 2) time sharing system 3) both of above 4) None of above

Last Answer : 1) Real time system

Description : The principle of time sharing is 1 large numbers of users direct access to the computer for problem solving 2 large number of user for file sharing 3 both of above 4 none

Last Answer : 1 large numbers of users direct access to the computer for problem solving

Description : A System in which a transaction access and updates a file quickly enough to affect the original decision making is called 1 Real time system 2 time sharing system 3 both of above 4 None of above

Last Answer : 1 Real time system

Description : Are there such things as gender specific roles anymore?

Last Answer : I always thought - all of us are just people. Sure, hormones make some small differences about how someone acts. And one of us has periods+cramps while the other doesn't. We have to be ... each other's traditional tasks. Save for birth (for the time being, think of Arnold pregnant hehe).

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned

Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses

Description : You and nine other individuals have been captured by super intelligent alien overlords. The aliens think humans look quite tasty, but their civilization forbids eating highly logical and cooperative beings. ... , each of you must guess the color of your hat starting with the perso -Riddles

Last Answer : Let's see how it would play out if the hats were distributed like this. The tallest captive sees three black hats in front of him, so he says 'black,' telling everyone else he sees an odd ... go. It looks like these aliens will have to go hungry, or find some less logical organisms to abduct.

Description : Which of the following responses identifies a role of T lymphocytes? a) Transplant rejection Transplant rejection and graft-versus-host disease are cellular response roles of T cells. ... ) Bacterial phagocytosis and lysis Bacterial phagocytosis and lysis are humoral response roles of Blymphocytes.

Last Answer : a) Transplant rejection Transplant rejection and graft-versus-host disease are cellular response roles of T cells.

Description : A hardened firewall host on an intranet (i) has a proxy application gateway program running on it (ii)Allows specified internet users to access specified services in the intranet (iii) Initiates all internet activities requested by clients ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : c. i, ii, iii, iv 

Description : How many bits Internet address is assigned to each host on a TCP/IP Internet which is used in all communications with host?  A) 16 bits B) 32 bits C) 48 bits D) 64 bits

Last Answer : How many bits Internet address is assigned to each host on a TCP/IP Internet which is used in all communications with host?  32 bits

Description : What are the best p2p file sharing network on the web?

Last Answer : Still torrents last time I checked. Usenet is worth looking into but not p2p

Description : How to Connect Two Computers on a WiFi Network for File Sharing?

Last Answer : Having two computers on a WiFi network can be extremely usefulif you need to transfer or share files between the two. With mostWiFi network, files transfer at lightning speed, and devices suchas ... they are both connected.Turning on File and Printer SharingTo enable this feature, it can usually

Description : What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model? a. Internet b. Host to host c. Network Access d. Application

Last Answer : b. Host to host

Description : Point out the wrong statement. a) Load balancing virtualizes systems and resources by mapping a logical address to a physical address b) Multiple instances of various Google applications are running on different hosts c) Google uses hardware virtualization d) All of the mentioned

Last Answer : Google uses hardware virtualization

Description : Point out the wrong statement. a) Load balancing virtualizes systems and resources by mapping a logical address to a physical address b) Multiple instances of various Google applications are running on different hosts c) Google uses hardware virtualization d) All of the mentioned

Last Answer : Google uses hardware virtualization

Description : Why would Ask-public.com censor things such as file-sharing community information?

Last Answer : it hasn’t hindered them since the start. this isn’t a blog or forum for sharing “file-sharing community information” plain and simple.

Description : Malfunctioning /etc/hosts file in OS X?

Last Answer : What did you use to edit the file? Perhaps what you used is fucking up the line breaks.

Description : HOSTS file entries are limited to how many characters? A. 8 B. 255 C. 500 D. Unlimited E. None of the above

Last Answer : 255

Description : In _______forwarding, the destinationaddress is anetworkaddress in the routingtable. A) next-hop B) network-specific C) host-specific D) default

Last Answer : network-specific

Description : In _______forwarding, the mask anddestination addresses are both 0.0.0.0 in therouting table. A) next-hop B) network-specific C) host-specific D) default

Last Answer : default

Description : In _______forwarding, the full IP address of a destination isgiven in the routing table. A) next-hop B) network-specific C) host-specific D) default

Last Answer : host-specific

Description : Programs that ask servers for services are called (a) users (b) hosts -Technology

Last Answer : (c) In the client-server model, the client is a piece of hardware/software that ask servers for services.

Description : A one-to-many communication between one sourceand a specific group of hosts is classifiedas a _______ communication. A) unicast B) multicast C) broadcast D) none of the above

Last Answer : multicast