1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ganezh [65]
3 years ago
5

In addition to the ping command, what other command is useful in displaying network delay and breaks in the path to the destinat

ion
Computers and Technology
2 answers:
Natalija [7]3 years ago
8 0
Tracert (windows) or traceroute (linux) will display the hops in the path between source and destination.
ira [324]3 years ago
7 0

Answer:

Traceroute or Tracert (for Windows)

Explanation:  

Traceroute command is used to trace a path between two systems. It measures the speed and route which the packet takes to a destination and also the time it takes to reach from source to destination. Tracert is Windows version of traceroute command. It shows different hops required to transmit from the source to destination system. It shows the different routers or number of hops needed to reach from the source system to the destination system. This helps to find out if the packets are taking an estimated route to get to the remote system. Traceroute helps to specifyvwhere network delay is occurring.

Traceroute sends data packets with low survival time, which determines how many hops can the packet survive before it is returned. When a packet is unable to reach the final destination and expires at halfway, that node returns the packet and identifies itself. Traceroute identifies intermediate hosts by slowly increasing survival time. If any of the hops come back with  Request timed out, it indicates network traffic or congestion.

Difference between ping and traceroute is that Ping determines quickly and easily if the specified server can be reached. It also specifies the time it will take to send and receive data from destination. In contrast, Traceroute determines the exact route to reach the server and time taken by every hop.

You might be interested in
Which type of password would be considered secure
ElenaW [278]
Most secure passwords contain a variation of; Uppercase letters, lowercase letters, numbers, and symbols.

Hope this helped!
8 0
3 years ago
Read 2 more answers
I have this questions i need to make it in a report format pages of atleast 3 pages and maximum of 5 pages​
Nuetrik [128]

First write what is software take one page for that

and each page for all other topics

6 0
3 years ago
A Chain of dry-cleaning outlets wants to improve its operations by using data from devices at individual locations to make real-
Svetllana [295]

The technology would the business combination with its current cloud operations to make this possible are ERP and loT.

<h3>What is the ERP?</h3>

Enterprise resource planning (ERP) refers to a shape of a software program application that companies use to manipulate each day industrial organization sports activities in conjunction with accounting, procurement, task management, chance manage and compliance, and supply chain operations.

  1. Given the organization has a cloud setup, we need a company solution (ERP system) which needs to be to be had to all stores and loT to build up facts from devices and deliver it over to the ERP system.
  2. This will help to connect records at some crucial databases in cloud from all the stores.
  3. There need to be record protection features as well to maintain the records intact, all profits features need to be incorporated and tested.

Read more about the ERP :

brainly.com/question/14635097

#SPJ1

7 0
2 years ago
The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless netw
Bogdan [553]

Answer:

Change default username and password.

Explanation:

The corporation under which Derek works has assigned him an assignment of establishing and safeguarding a SOHO router. He intends to ensure that maybe the wireless connection is protected and no further unauthorized person would connect the device to the router. So, the first task is to simply change the username and password that the wifi routers will be secured.

So, the following answer is correct about the given scenario.

6 0
3 years ago
____ is a technique for confirming that q received packet or frame is likely to match what was sent
hammer [34]

Answer:

C. Error checking

Explanation:

I hope this helps

6 0
3 years ago
Other questions:
  • Due to the internal style sheets of some browsers, your website may look different to someone who is using firefox as opposed to
    11·1 answer
  • A Narrative Statement illustrates how your life will look when you reach a goal.
    15·2 answers
  • Put the steps of the decision-making process in the correct order.
    12·1 answer
  • If you see ________________________ in a cell, it means the column is not wide enough to display the cell content. Select one: a
    15·1 answer
  • Which are characteristics of an effective solution? Choose all that apply. solves the problem in anticipated ways each time resu
    5·1 answer
  • Union Carbide accident safety policies and procedures were not followed was due to
    14·1 answer
  • Whats the formatting of a letter to the editor?​
    12·1 answer
  • What is keyword density?
    15·2 answers
  • I need help now with YT
    7·2 answers
  • There are many potential risks associated with the internet. what do we call the distribution and access of illegal copies of di
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!