If two computers are connected on a bridged network, are changes required in addressing or in applications? Explain.

What will be an ideal response?


Computers and applications running on the computers attached to a bridged network are not
aware of the fact they are connected through a bridge. No changes are required on them.

Computer Science & Information Technology

You might also like to view...

A Navigation Pane group is a top-level listing that displays when the Navigation Pane arrow is clicked

Indicate whether the statement is true or false

Computer Science & Information Technology

You can also click the ____ icon in the Actions panel to open the Find and Replace dialog box to replace multiple instances of text in the Script pane.

A. Find B. Replace C. Find and Replace D. Check

Computer Science & Information Technology

____ is equivalent to (*pointer).member.

A. *pointer.member B. pointer>member C. pointer->member D. pointer@member

Computer Science & Information Technology

The original definition of ____ is a software security vulnerability in Web applications that can be used by an attacker to compromise the same origin policy of client-side scripting languages.

A. denial of service B. cross-site scripting C. phishing D. SQL injection

Computer Science & Information Technology