What is the subnet mask and what is the default gateway

Assignment Help Basic Computer Science
Reference no: EM132517420

Using ping, ipconfig/ifconfig, traceroute and nslookup, answer the following questions. Your computer should be connected to the Internet either via a wired or a wireless connection. I Need Screen Shot for each Answer.

1. What IP address did you receive?

2. What is the subnet mask?

3. What is the default gateway?

4. What DNS servers are you resolving to?

5. Are you able to ping espn.com?

6. What DNS server is currently resolving espn.com?

7. What is the IP address of the DHCP server you received your IP address from?

8. What is the MAC address of the network interface card you are using to connect to the Internet?

9. What is the next hop router IP address that is used after your default gateway to get to espn.com?

10. What is the fully qualified domain name (the name) of the IP address 8.8.8.8?

Reference no: EM132517420

Questions Cloud

What was the property division residual income : Based on Gideon's required rate of return of 8%, what was the property division's residual income for 2019? What was the division's ROI for the year?
Database management plan : Decide what data elements need to be stored. Analyze major component of the SDLC when developing this database application.
Information systems and database design : What is the relationship between a database and an information system? What impact does this relationship have on database design?
Determine what is the fixed overhead spending variance : If Skizone's combined 4- Variance Analysis shows an unfavorable spending variance of $2,900, what is the fixed overhead spending variance
What is the subnet mask and what is the default gateway : What is the subnet mask? 3. What is the default gateway? What DNS server is currently resolving espn.com?
What overall effect on the company annual gross margin : Chemise Shirt Company average selling price, What should be the overall effect on the company's annual gross margin of this change?
Determine joe margin of safety in sales dollars : Joe's Tax Service, Determine Joe's margin of safety in sales dollars. Joe's Tax Service prepares tax returns for low-to middle-income taxpayers.
Research example of cyber terrorism : Using the Web or other resources, research an example of Cyber Terrorism.
Calculate the markup percentage and target selling price : Determine What other options does Cedarburg have to price its products? What internal and external factors should they consider?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Does the use of search engines threaten the privacy

Does the use of search engines threaten the privacy of ordinary people - Please keep it simple and short and no copy and paste.

  What is a piecewise polynomial

State three shortcomings of polynomial interpolation that are improved upon by piecewise polynomial interpolation.

  Favor of reducing taxes on repatiated earnings

Some have argued in favor of reducing taxes on repatiated earnings that companies operating in the US have made in other countries.

  Pros and cons of automation in the workplace

Question 1: Look for a reliable YouTube video or internet article about the pros and cons of automation in the workplace.

  Describe two aspects to implementing six-sigma concept

Describe foundation of Deming's 14 Points. Describe two aspects to implementing six-sigma concept. Describe ten guidelines for selecting forecasting software.

  The single greatest physical threat to information systems

What do you think is the single greatest physical threat to information systems? Fire? Hurricanes? Sabotage? Terrorism?

  Compare the performance to that obtained using regular locks

Change the locks to read-write locks in the hash table and use write locks only when inserting an entry into the linked list. Examine the performance of this program as a function of k. Compare the performance to that obtained using regular locks.

  Discussion of vulnerabilities

The paper should include the features of secure e-mail and how secure e-mail works. Include a discussion of vulnerabilities involved in e-mail and how they can be countered. The presentation should include the following:

  How "direction" can be used in an effective publication?

What are four examples of how "direction" can be used in an effective publication?

  What is the current market value of elite''s bond

Eleven years ago, Elite Elements issued a 15-year bond with a $1,000 face value and a 5 percent coupon rate of interest (paid semiannually). If investors require a return equal to 7 percent to invest in similar bonds, what is the current market va..

  Explain why standards enable the policy by defining action

a) Explain why standards enable the policy by defining action. b) Provide an example to show the difference between password policy and password standard.

  Describe?how can join types be used to develop a schema

Describe?how can join types be used to develop a schema statement? What are the roles of a cross join and metadata play in the selection of join types?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd