Bob obtained network information from a workstation including the contents of an Ethernet frame. This data could be used to determine details about the host computer and packet, and describe what would happen if the host attempted to ping various domain names after converting applicable values to decimal notation.