Question

- O X Command Prompt C:\Users\acer>ipconfig /all Windows IP Configuration Host Name .. :::......: DESKTOP-DOOLOVV Primary DnsPlease explain all of these in one paragraph? This is a ipconfig/all

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer)

In this output of ipconfig /all indicates that there are four adapters, 2 ethernet or LAN adapter and 2 are wireless adapters and all the adapters are disconnected, so network is not possible.The output signifies the hostname is DESKTOP-D09LOWY , and it is a Hybrid node which means it for DNS or name server query it goes to WINS server if not found then it will broadcast to search a domain controller.IP Routing is disabled.WINS proxy is also disabled.
Then it describes the configuration of the 1st ethernet adapter, where there is no LAN cable connected because it show Media Disconnected,but it is configured to domain name, then it describes the company of the ethernet adapter then it show the mac address of the adapter,and also it shows that DHCP is enabled, so if the LAN media is connected then it can fetch the IP Address from a DHCP Server and also if the DHCP server is not found then the adapter can generate its own IP address as Autoconfiguration is Enabled. The same type of configuration is applied to all other adapter. And in the name it shows which adapter are Ethernet based and Wireless based.

Add a comment
Know the answer?
Add Answer to:
Please explain all of these in one paragraph? This is a ipconfig/all - O X Command...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Question: Your Answer: What is the IP Address of the computer? If this computer could reach...

    Question: Your Answer: What is the IP Address of the computer? If this computer could reach the Internet but could not resolve names on the Internet, assuming that these settings are correct, which computer would you check to make sure it is running? What is the fully qualified domain name for this computer? What is the MAC address of this Network Adapter? What is the IP address of the device that provided the computer IP Address? What is the CIDR...

  • . Long on to a PC with the administrator account, or an account that has administrator privilege....

    . Long on to a PC with the administrator account, or an account that has administrator privilege. Please take a note of your system information and location where you perform the lab. Open the command prompt. For Windows 10, type cmd in Cortona. For Windows XP. choose Start à Run, and type cmd in the Open field. For Windows 7, click on Start, enter cmd in "Search program and file, and choose "cmd.exe from search result. For Windows 8 press...

  • use TOLEDO OHIO USA IP ADDRESS and typed please! 1 of 1 Environment variables are some of the most useful tools avai...

    use TOLEDO OHIO USA IP ADDRESS and typed please! 1 of 1 Environment variables are some of the most useful tools available to command shell script writers. By default, all Windows systems include a host of environment variables that can provide important information about the system and the current user a Run ipconfig /all in the command line. What is your computer's running Ipv6 address? 2) To list all your system's environment variables, you can type "set". What the COMPUTERNAME...

  • Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic...

    Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic redundancy check (CRC) A. Yes, No, No B. No, Yes, Yes c. No, Yes, No D. No, No, Yes E. Ho, hum, ha Q2 CRC vs Internet checksums Which of these is not true? A. CRC's are commonly used at the link layer B. CRC's can detect any bit error of up to r bits with an r-bit EDC. c. CRC's are more resilient to bursty...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT