SlideShare a Scribd company logo
1 of 1
Download to read offline
1. Every computer has a name. Yours is called (run the command "ipconfig /all" or look in
system info > summary) 2. My computer communicates on a LAN and to the internet often via
an Ethernet network interface card (NIC). How many network cards does my computer have?
(ipconfig /all) 3. My network card(s) has(ve) a unique address encoded in them. This physical
entity is called the MAC address. It is an abbreviation for media access control (something to do
with how one computer gets the attention of another computer standing in a crowd). Using two
different methods determine what is(are) the MAC address(es), also known as physical
address(es), of your computer? What are the two methods used? (ipconfig /all, sys info >
components > network > adapter) 4. Note the MAC address uses a hex code (4 binary bits
combined). This means digits are encoded in both alpha and numerical. How many hex
characters are used in the MAC address discovered for your computer?

More Related Content

Similar to 1- Every computer has a name- Yours is called (run the command -ipconf.pdf

1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
eyebolloptics
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming concepts
hermiraguilar
 
Pears
PearsPears
Pears
thips
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming concepts
hermiraguilar
 
COC to-manage-and-monitor-the-network.pdf
COC to-manage-and-monitor-the-network.pdfCOC to-manage-and-monitor-the-network.pdf
COC to-manage-and-monitor-the-network.pdf
habtex1230
 
1A Description Computer security protects computer system.pdf
1A Description Computer security protects computer system.pdf1A Description Computer security protects computer system.pdf
1A Description Computer security protects computer system.pdf
adamsapparels
 

Similar to 1- Every computer has a name- Yours is called (run the command -ipconf.pdf (20)

Processing Data
Processing DataProcessing Data
Processing Data
 
Introduction to Computer System-ppt.pptx
Introduction to Computer System-ppt.pptxIntroduction to Computer System-ppt.pptx
Introduction to Computer System-ppt.pptx
 
Csc118 chapter1
Csc118 chapter1Csc118 chapter1
Csc118 chapter1
 
How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...
 
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Cluster computer
Cluster  computerCluster  computer
Cluster computer
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming concepts
 
Pears
PearsPears
Pears
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming concepts
 
Hardware & networking
Hardware & networkingHardware & networking
Hardware & networking
 
COC to-manage-and-monitor-the-network.pdf
COC to-manage-and-monitor-the-network.pdfCOC to-manage-and-monitor-the-network.pdf
COC to-manage-and-monitor-the-network.pdf
 
1A Description Computer security protects computer system.pdf
1A Description Computer security protects computer system.pdf1A Description Computer security protects computer system.pdf
1A Description Computer security protects computer system.pdf
 
Computer architecture instruction formats
Computer architecture instruction formatsComputer architecture instruction formats
Computer architecture instruction formats
 
Operating System Fingerprinting Prevention
Operating System Fingerprinting PreventionOperating System Fingerprinting Prevention
Operating System Fingerprinting Prevention
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notes
 
Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
 
Free Hardware & Networking Slides by ITE Infotech Private Limited
Free Hardware & Networking Slides by ITE Infotech Private LimitedFree Hardware & Networking Slides by ITE Infotech Private Limited
Free Hardware & Networking Slides by ITE Infotech Private Limited
 
Computer software
Computer softwareComputer software
Computer software
 

More from contact28

1- Label the left and right sides of the heart- How did you figure out.pdf
1- Label the left and right sides of the heart- How did you figure out.pdf1- Label the left and right sides of the heart- How did you figure out.pdf
1- Label the left and right sides of the heart- How did you figure out.pdf
contact28
 
1- INTRODUCTION In any introductory textbook on physical geology- the.pdf
1- INTRODUCTION In any introductory textbook on physical geology- the.pdf1- INTRODUCTION In any introductory textbook on physical geology- the.pdf
1- INTRODUCTION In any introductory textbook on physical geology- the.pdf
contact28
 

More from contact28 (20)

1- Identify symptoms and formulate a problem 2- Define the main questi.pdf
1- Identify symptoms and formulate a problem 2- Define the main questi.pdf1- Identify symptoms and formulate a problem 2- Define the main questi.pdf
1- Identify symptoms and formulate a problem 2- Define the main questi.pdf
 
1- Label the left and right sides of the heart- How did you figure out.pdf
1- Label the left and right sides of the heart- How did you figure out.pdf1- Label the left and right sides of the heart- How did you figure out.pdf
1- Label the left and right sides of the heart- How did you figure out.pdf
 
1- Is a series of chemical reactions that convert light energy- water-.pdf
1- Is a series of chemical reactions that convert light energy- water-.pdf1- Is a series of chemical reactions that convert light energy- water-.pdf
1- Is a series of chemical reactions that convert light energy- water-.pdf
 
1- Draw a Lorenz curve with equal distribution of income- Draw a Loren.pdf
1- Draw a Lorenz curve with equal distribution of income- Draw a Loren.pdf1- Draw a Lorenz curve with equal distribution of income- Draw a Loren.pdf
1- Draw a Lorenz curve with equal distribution of income- Draw a Loren.pdf
 
1- It is clear that the innate and adaptive arms of the immune respons.pdf
1- It is clear that the innate and adaptive arms of the immune respons.pdf1- It is clear that the innate and adaptive arms of the immune respons.pdf
1- It is clear that the innate and adaptive arms of the immune respons.pdf
 
1- Is Meta's metaverse on track to offer a leap in value to users- or.pdf
1- Is Meta's metaverse on track to offer a leap in value to users- or.pdf1- Is Meta's metaverse on track to offer a leap in value to users- or.pdf
1- Is Meta's metaverse on track to offer a leap in value to users- or.pdf
 
1- INTRODUCTION In any introductory textbook on physical geology- the.pdf
1- INTRODUCTION In any introductory textbook on physical geology- the.pdf1- INTRODUCTION In any introductory textbook on physical geology- the.pdf
1- INTRODUCTION In any introductory textbook on physical geology- the.pdf
 
1- In trying to determine if an illness is being caused by a Plasmodiu.pdf
1- In trying to determine if an illness is being caused by a Plasmodiu.pdf1- In trying to determine if an illness is being caused by a Plasmodiu.pdf
1- In trying to determine if an illness is being caused by a Plasmodiu.pdf
 
1- Identify four typical indirect project costs- 2- When attempting to.pdf
1- Identify four typical indirect project costs- 2- When attempting to.pdf1- Identify four typical indirect project costs- 2- When attempting to.pdf
1- Identify four typical indirect project costs- 2- When attempting to.pdf
 
1- In the onion cell is the nucleus located in the cytoplasm or the ce.pdf
1- In the onion cell is the nucleus located in the cytoplasm or the ce.pdf1- In the onion cell is the nucleus located in the cytoplasm or the ce.pdf
1- In the onion cell is the nucleus located in the cytoplasm or the ce.pdf
 
1- Identify each of the following muscles on the torso models- label t.pdf
1- Identify each of the following muscles on the torso models- label t.pdf1- Identify each of the following muscles on the torso models- label t.pdf
1- Identify each of the following muscles on the torso models- label t.pdf
 
1- In certain species of chickens the allele for black feathers (B) is.pdf
1- In certain species of chickens the allele for black feathers (B) is.pdf1- In certain species of chickens the allele for black feathers (B) is.pdf
1- In certain species of chickens the allele for black feathers (B) is.pdf
 
1- In simple terms- explain what cofounded AND extraneous variables me.pdf
1- In simple terms- explain what cofounded AND extraneous variables me.pdf1- In simple terms- explain what cofounded AND extraneous variables me.pdf
1- In simple terms- explain what cofounded AND extraneous variables me.pdf
 
1- Identify children at different ages and ask- -Tell me about yoursel.pdf
1- Identify children at different ages and ask- -Tell me about yoursel.pdf1- Identify children at different ages and ask- -Tell me about yoursel.pdf
1- Identify children at different ages and ask- -Tell me about yoursel.pdf
 
1- Does it make sense for the private equity firms to exit their Quint.pdf
1- Does it make sense for the private equity firms to exit their Quint.pdf1- Does it make sense for the private equity firms to exit their Quint.pdf
1- Does it make sense for the private equity firms to exit their Quint.pdf
 
1- Identify the relevant clinical data from the scenario 2-Prioritis.pdf
1- Identify the relevant clinical data from the scenario   2-Prioritis.pdf1- Identify the relevant clinical data from the scenario   2-Prioritis.pdf
1- Identify the relevant clinical data from the scenario 2-Prioritis.pdf
 
1- Identify the type of transformation that follows and the type(s) of.pdf
1- Identify the type of transformation that follows and the type(s) of.pdf1- Identify the type of transformation that follows and the type(s) of.pdf
1- Identify the type of transformation that follows and the type(s) of.pdf
 
1- Identify the layers of the scalp- Enumerate the important structure.pdf
1- Identify the layers of the scalp- Enumerate the important structure.pdf1- Identify the layers of the scalp- Enumerate the important structure.pdf
1- Identify the layers of the scalp- Enumerate the important structure.pdf
 
1- How might a healthcare provider apply intersectionality theory when.pdf
1- How might a healthcare provider apply intersectionality theory when.pdf1- How might a healthcare provider apply intersectionality theory when.pdf
1- How might a healthcare provider apply intersectionality theory when.pdf
 
1- Human Ancestors (10 POINTS)- Discuss the statement that -modern hum.pdf
1- Human Ancestors (10 POINTS)- Discuss the statement that -modern hum.pdf1- Human Ancestors (10 POINTS)- Discuss the statement that -modern hum.pdf
1- Human Ancestors (10 POINTS)- Discuss the statement that -modern hum.pdf
 

Recently uploaded

MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MysoreMuleSoftMeetup
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 

Recently uploaded (20)

ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 

1- Every computer has a name- Yours is called (run the command -ipconf.pdf

  • 1. 1. Every computer has a name. Yours is called (run the command "ipconfig /all" or look in system info > summary) 2. My computer communicates on a LAN and to the internet often via an Ethernet network interface card (NIC). How many network cards does my computer have? (ipconfig /all) 3. My network card(s) has(ve) a unique address encoded in them. This physical entity is called the MAC address. It is an abbreviation for media access control (something to do with how one computer gets the attention of another computer standing in a crowd). Using two different methods determine what is(are) the MAC address(es), also known as physical address(es), of your computer? What are the two methods used? (ipconfig /all, sys info > components > network > adapter) 4. Note the MAC address uses a hex code (4 binary bits combined). This means digits are encoded in both alpha and numerical. How many hex characters are used in the MAC address discovered for your computer?