1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enyata [817]
3 years ago
11

Which utility would you use to return the common name of the computer you're at? Execute this command and submit screen shots.

Computers and Technology
1 answer:
ruslelena [56]3 years ago
8 0
As far as I remember, Ping.exe utility is used to return the common TCP/IP name of the computer you are at. First you need to open cmd.exe. Then you should enter: ping -a XXX.XXX.X.X, where X's are your IP address. It's easy, so you can try it on your own, because I can't reveal my IP.
You might be interested in
What are the three parts of a camera
son4ous [18]

Answer: Camera lens, Film or sensors, and body.

Explanation: I researched it.

8 0
3 years ago
The Internet may best be compared to a/an
Usimov [2.4K]
A volcano because its always erupting
3 0
3 years ago
What linux command displays the ip address and subnet mask?
Nookie1986 [14]
Type "ifconfig" at the terminal prompt, then press the "Enter" key. The IP address is labeled as "inet addr." The subnet is labeled as "Mask."

step 2

Type "netstat -r" at the command prompt, then press the "Enter" key to view the gateway address.

3 0
3 years ago
Is the disk in the C: drive fixable or removable disk
katrin2010 [14]

Answer:

The disk is a removable disk.

8 0
3 years ago
Read 2 more answers
On a Linux system it is considered bad manners to create files and folders in the _______________ directory.
guapka [62]

Answer:

Root

Explanation:

Linux is an open source operating system which receives command from the user and communicates with the hardware, and in Linux the root directory is the top level directory that contains all other directory, it is not recommended to create files and folders in  the root directory because the commands the user enters may change files that the operation system may depend on for usage.

5 0
3 years ago
Other questions:
  • How do computers find servers, requests information from the server, and receives it?
    12·1 answer
  • You are adding a new 500 GB hard drive to your computer. The hard drive must be formatted with a file system to organize files i
    8·1 answer
  • An attacker tried to hack into the database of a reputed organization. The attacker inserted malicious code into the query of a
    14·1 answer
  • _______ make up the basic structure of a relational database with columns containing field data and rows containing record infor
    6·2 answers
  • ____ are the in-house equivalent of Internet newsgroups. They use Web- or software-based discussion tools that are available acr
    13·1 answer
  • Which of the following is not part of the four ways you can avoid problems with email communication?
    12·1 answer
  • the outline view allows you to control how much information you can see in a document, because you can expand or collapse sectio
    12·1 answer
  • Please describe the role of games in modern society!
    15·2 answers
  • Explain the<br>4 ways<br><br>ways of arranging icons.<br><br>​
    6·1 answer
  • Enabling encryption of all data on a desktop or laptop computer is generally considered:______.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!