1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Helga [31]
3 years ago
14

The ____ command sends a small tcp/ip packet to another ip address and awaits a response.

Computers and Technology
1 answer:
Anuta_ua [19.1K]3 years ago
7 0
In *nix, the ping command keeps on sending ICMP packets unless the "-c" (count) argument is passed. In Windows, ping defaults to 4 ICMP packets.
You might be interested in
All of the following are technical solutions to protecting user privacy except: Group of answer choices Data use policies Anonym
RoseWind [281]

Answer:

Data use policies

Explanation:

Technically data use policies are not specifically made to protect user privacy, however it also should not violate user privacy. Data use policies are required by law. They are compulsory disclosures that list the various ways in which data in the form of personal data of individuals is collected, shared or used by digital companies(companies that operate on the internet, make use of email lists, etc ) are used.

4 0
3 years ago
_____________is the act of protecting information and the systems that store and process it.A.Information systems securityB.Poli
mylen [45]

Answer:

A. Information System Security (ISS)

Explanation:

Information System security is a very important security in any organization.

The main focus of Information system security is the system itself and the information that the system possesses, processes and stores.

Information system security, or infosec for short, is the modality involved in protecting information and in making it available.

With Infosec,

1. an organization's ability to perform is protected

2. the data an organization uses is protected ensuring integrity

3. programs, applications and technology implemented on an organization's systems are safely used.

Hope this helps!

3 0
3 years ago
Read 2 more answers
Why did the editors choose to rearrange the intercutting between Luke’s story and the Imperials? What effect did this have on th
kompoz [17]

Answer:

Though it has its merit, know that the rule is not mandatory. ... A jump cut is a cut in film editing in which two sequential shots of the ... An intercut is a type of edit where two or more actions in distinct ...

3 0
3 years ago
Describe two types of images you can open in photoshop
vredina [299]

Answer: PSD JPEG PNG

Explanation:

6 0
3 years ago
When making changes to existing font, the user must first _____.
Eva8 [605]

Answer:

select the font place the cursor in the paragraph choose the font color select the font dialog box.

Explanation:

6 0
3 years ago
Other questions:
  • Andrew received a text file with data from a company he works with. He would like to have all of the data in his database. Andre
    5·2 answers
  • The enhanced for statement allows you to iterate through the elements of an array or a collection without using a counter. Give
    10·2 answers
  • Sam needs to create a spreadsheet for his coworkers. They will need to follow a crossed a long road of data. Sam would like to m
    15·1 answer
  • Designing advanced power systems for naval vessels is an example of nuclear engineering.
    7·2 answers
  • Im boing exam help please In a category-based course grading system, teachers weigh a student's performance in all courses. all
    7·2 answers
  • Write a function template that accepts an argument and returns its absolute value. The absolute value of a number is its value w
    11·1 answer
  • A new president has been elected. She promises to lower taxes drastically. What is most LIKELY to happen as a result of this dec
    8·1 answer
  • If consumers start to believe they need a product, what is likely to happen
    15·1 answer
  • Which is government departments fund the Global Positioning System
    6·1 answer
  • A network administrator has asked robin, a network engineer, to use ospf (open shortest path first) along with rip (routing info
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!