1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ganezh [65]
3 years ago
5

In addition to the ping command, what other command is useful in displaying network delay and breaks in the path to the destinat

ion
Computers and Technology
2 answers:
Natalija [7]3 years ago
8 0
Tracert (windows) or traceroute (linux) will display the hops in the path between source and destination.
ira [324]3 years ago
7 0

Answer:

Traceroute or Tracert (for Windows)

Explanation:  

Traceroute command is used to trace a path between two systems. It measures the speed and route which the packet takes to a destination and also the time it takes to reach from source to destination. Tracert is Windows version of traceroute command. It shows different hops required to transmit from the source to destination system. It shows the different routers or number of hops needed to reach from the source system to the destination system. This helps to find out if the packets are taking an estimated route to get to the remote system. Traceroute helps to specifyvwhere network delay is occurring.

Traceroute sends data packets with low survival time, which determines how many hops can the packet survive before it is returned. When a packet is unable to reach the final destination and expires at halfway, that node returns the packet and identifies itself. Traceroute identifies intermediate hosts by slowly increasing survival time. If any of the hops come back with  Request timed out, it indicates network traffic or congestion.

Difference between ping and traceroute is that Ping determines quickly and easily if the specified server can be reached. It also specifies the time it will take to send and receive data from destination. In contrast, Traceroute determines the exact route to reach the server and time taken by every hop.

You might be interested in
Which threading model is best for achieving true parallelism and how?
WITCHER [35]

Answer:

The explantion of this question is given below in the explanation section.              

Explanation:

Parallelism means that an application is split into smaller subtasks that can be processed in parallel on multiple CPU at the same time. Parallelism is related to application handling individual tasks on multiple CPUs. To achieve true parallelism your application must have more than one thread running, schedule the task into other threads, graphics cards, and CPU, etc.  

It is noted that parallelism is a concept while multiple threading in computer programing is its implementation. Some operating systems provide a multiple threading that combined the user-level thread and kernel-level thread facility. In such a system, multiple threads within the same application can run in parallel on multiple CPU or processors

There are three types of Multithreading Model

• Many to many relationships.

• Many to one relationship.

• One to one relationship.

Many to many relationship

This model multiplexes any number of user threads onto an equal or smaller number of kernel threads. However, this model provides the best accuracy to concurrency. However, using this model, true parallelism can be achieved, if the system has multiprocessor.  

Many to One model

This model maps the user-level threads to one kernel-level thread and its management is done in userspace by the thread library. In this model, only one thread can access the Kernal at a time, so multiple threads are unable to run on multiple CPU in parallel.  

One to one relationship

This model provides one to one relationship between the user and kernel-level thread. This model is better than the many-to-one model. It allows another thread to execute when a thread makes a blocking system call. However, it supports multiple threads to execute in parallel on the microprocessor. This model provides true parallelism.  

                                                                  

7 0
3 years ago
What is zenmap typically used for? how is it related to nmap? describe a scenario in which you would use this type of applicatio
slava [35]

Zenmap is the graphical User Interface representation for NMAP Security Scanner. It is an open-source program designed to make NMAP easy for starters to use. Typically, it is used to collect and identify a list of hosts, OS, as well what services are running on them by using a port scanning tool. It is used specifically for the scanning and vulnerability phase of ethical hacking.

A network administrator who wishes to audit all the devices on a specific IP scheme in a network can use NMAP. The admin can go ahead and scan the ports to know exactly which ports are closed and which are opened.






8 0
3 years ago
T<br> F<br> 5.<br> You can save presentations in PDF and XPS formats.
S_A_V [24]
True, presentations can be saved as PDF’s it will come out as separate pages though
7 0
3 years ago
True or False <br><br> Rootkits are only made by black-hat hackers.
andreyandreev [35.5K]

Answer:

True

Explanation:

Rootkits are malicious software that allows an unauthorized user to access a computer and restricted areas of software. Rootkits are difficult to detect on your computer because it may be able to subvert there that is intended to find it. Rootkits are created by Black-hat hackers to attack your computer and steal.

Rootkit tools:

1. Keyloggers

2. antivirus disablers

3. password stealers

4. banking credential stealers

5. bots for DDoS attacks

8 0
3 years ago
What is Tesla BEST know for designing this? ANSWER
Aleonysh [2.5K]

Answer:

  1. tesla coils
  2. tesla
  3. edison
  4. x ray
  5. slinky
  6. time travel
  7. he spent it
  8. blue tooth

Explanation:

3 0
3 years ago
Other questions:
  • Jason is creating a webpage on the basic parts of a camera. He has to use a mix of both images and content for the web page to h
    11·1 answer
  • What percentage of jobs work in the entertainment industry?
    13·1 answer
  • Diane is receiving a lot of unwanted e-mail. What steps can she take to reduce the amount of e-mail she receives?
    12·1 answer
  • What is the information that there are 24 hours in a day and 365 days in a year considered?
    6·2 answers
  • i need to also do a algorithm where if the total is a even number 10 points are added to the score and if the total is odd then
    11·1 answer
  • Can find error , suppose to print what season it is and if fails : Traceback (most recent call last):
    11·1 answer
  • Write a recursive method that receives a string as a parameter and recursively capitalizes each character in the string (change
    5·1 answer
  • A school has an intranet for the staff and students to use. Some of the files stored on the intranet are confidential. Give two
    15·1 answer
  • Drag each tile to the correct box.
    9·2 answers
  • Can able to Computer decide its input by itself? How ?​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!