adplus-dvertising
frame-decoration

Question

Two machines are on the same subnet if the following parts of each machine's IP address are the same.

a.

First three numbers.

b.

Last three numbers.

c.

Only the first two numbers.

d.

The last number.

Posted under UNIX

Answer: (a).First three numbers.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Two machines are on the same subnet if the following parts of each machine's IP address are the same.

Similar Questions

Discover Related MCQs

Q. Which of the following is NOT a component of an X terminal:

Q. Which of the following is NOT a feature of a Window Manager program of X:

Q. Which of the following is not an X program type:

Q. Which of the following is a native X function:

Q. Which of the following statements is true:

Q. Most Unix users manage color using which of the following programs:

Q. Which of the following is NOT a valid format when editing a color configuration file in X Window System.

Q. Which of the following remote access programs is the most secure:

Q. Which of the following is not a major category of disability that require adaptive software:

Q. Adding a machine name to the file /etc/x0.host accomplishes which of the following:

Q. Which of the following is NOT a valid reason for running under-utilized services:

Q. Which of the following is the main limitation for not running a Web server over a small home network connected to the Internet with a cable modem:

Q. Which of the following is not an advantage of Apache over other mail servers:

Q. Which of the following is NOT an advantage of WN over Apache:

Q. Which mail process is first used when mail is send for the sender's mail client program:

Q. Which of the following is the most used mail server:

Q. Which of the following is NOT a task of administering a news server:

Q. Which of the following configuration files provides the path name for each of the servers and identifies the port on which each service listens for connections:

Q. Which of the following is the most secure remote access service:

Q. Which of the following entries in the /etc/inetd.conf file define the data flow method used by the service: