Communiquez avec les autres et partagez vos connaissances professionnelles

Inscrivez-vous ou connectez-vous pour rejoindre votre communauté professionnelle.

Suivre

> What is a MAC? >

a) Mediocre Apple Computer 

b) Memory Address Corruption 

c) Media Access Control 

d) A Computer made by Apple 

user-image
Question ajoutée par Emad Mohammed said abdalla , ERP & IT Software, operation general manager . , AL DOHA Company
Date de publication: 2015/09/09
Mohammad Basheer abu ahmad
par Mohammad Basheer abu ahmad , مشرف كمبيوتر ، الإشراف على الموظفين , قطاع عام

MAC : Media Access Control by Macintosh

Emad Mohammed said abdalla
par Emad Mohammed said abdalla , ERP & IT Software, operation general manager . , AL DOHA Company

>>>>>>>>>>>>>>>>>>>>>>> c) Media Access Control 

Mohsin Patel
par Mohsin Patel , Accounting Analyst , Water G.

Media access control or the abbreviation of Apple's Macintosh 

Modassir khan
par Modassir khan , IT Support Engineer , Ministry Of Health And Prevention - UAE

Answer

c) Media Access Control 

Alam  Nawaz
par Alam Nawaz , Assistant Professor , Yeungnam University

A Media Access Control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment. Logically, MAC addresses are used in the Media Access Control protocol sub-layer of the OSI reference model.

MAC addresses are most often assigned by the manufacturer of a network interface card (NIC) and are stored in its hardware, the card's read-only memory, or some other firmware mechanism. If assigned by the manufacturer, a MAC address usually encodes the manufacturer's registered identification number. It may also be known as an Ethernet hardware address (EHA), hardware address, adapter address, or physical address.

Although intended to be a permanent and globally unique identification, it is possible to change the MAC address on most of today's hardware, an action often referred to as MAC spoofing. Unlike IP address spoofing, where a sender spoofing their address in a request tricks the other party into sending the response elsewhere, in MAC address spoofing, the response is received by the spoofing party. However, MAC address spoofing is limited to the local broadcast domain.

In the IPv4 world, the MAC address of your computers is not propagated or detectable beyond your local network. This means that under normal browser operation (without plugin intervention), the MAC address of any computer positioned behind the router is not sent beyond the router, and so cannot be used to track you over the Internet. However, the router uses it internally in order to identify the local computers.

In IPv6, the bit "host" part of the full bit address is often automatically generated from the MAC address, and hence often is visible to the server one connects to. This means that outsiders may trace the MAC address of your router and your Internet-connected computers. IPv6 gives a public, routable address to every last PC, server, printer or network device (unless the router does NAT processing, which is rare in IPv6).

If private IPv6 address (defined in RFC) is turned on, the exposed identifier is generated as a random number rather than from the MAC. This is the default on many operating systems, but can be turned on and off. For further info see How to avoid exposing my MAC address in IPv6?

In any case, your ISP always knows who you are and can trace anything you do, unless the traffic is encrypted by using a VPN.

Muhammad Noman
par Muhammad Noman , SAP S4H FI Trainee , Excellence Delivered Pvt Ltd

Answer of the above question is Media Access Control

Badar Iqbal
par Badar Iqbal , Distribution Manager & K.P.O , Dalda Foods LTd

Option C Media Access Control ..........

Whether you work in a wired network office or a wireless one, one thing is common for both environments: It takes both network software and hardware (cables, routers, etc.) to transfer data from your computer to another—or from a computer thousands of miles away to yours.

Anoop Purushothaman
par Anoop Purushothaman , Senior Network and System Administrator , Integral Food Services WLL

Media Access Control, Also called physical Address, Every network device having MAC Address

Asim Ali
par Asim Ali , SAP HCM Support Officer , Al Tilal Steel Company Limited

c) Media Access Control Very important part for the physical address security of the device for the network

More Questions Like This