1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mash [69]
3 years ago
13

Explain why it is not necessary to create an inbound rule on the internal 192.168.12.10 Windows server so that it can receive th

e response (ICMP echo reply) from the internal 192.168.12.11 Windows server.
Computers and Technology
1 answer:
Lana71 [14]3 years ago
5 0

Answer:

The file and printer sharing (Echo Request - ICMPv4-In) rule option should be listed for all profile.

Explanation:

The main reason why it is not compulsory or obligatory to design an inbound rule on the internal 192.168.12.10 Windows server in other to be able to accept the response (ICMP echo reply) generated from the internal 192.168.12.11 Windows server is that the file and printer sharing (Echo Request - ICMPv4-In) rule option or alternative needed to be listed for all profile.

Inbound rules filter or sieve traffic advancing from the network to the local computer based on the filtering conditions set out in the rule.

You might be interested in
Assume that you have an array of integers named arr. The following program segment is intended to sum arr [0]through arr[n−1], w
Paladinen [302]

Answer:

There is only one modification in the above loop i.e. while loop should be like this--

while (i != n)

     {

         sum+=arr[i];   // Line 1, In question segment it is line 2.

          i++;                // Line 2,  In question segment it is line 1.

     }

Output:

Now if the array input is 1,2,3,4,5 then the output is 15.

Explanation:

In the above question, all the line of the segment is right except the body of the loop because--

  • The First line of the loop is increment statement which increments the value of "i" variable from 1 and the value of "i" variable will be 1 in the first iteration of the loop
  • The second line starts to add the value from 1'st index position of the array. Hence the segment gives the wrong answer. It adds the arr[1] to arr[n-1].
  • So I interchanged both lines of the while loop as shown in the answer part. I make the line 1 (In question segment) as line 2(In answer part) and line 2 (In question segment) as line 1 (In answer part).

Now It gives the correct output because it can add arr[0] to arr[n-1].

7 0
4 years ago
Lesson 3 - Calling All Operators
Tresset [83]

Answer:

.m

Explanation:

3 0
3 years ago
What does anyone who chooses to use speech recognition software need to do? Create a Guest Account.
vaieri [72.5K]

Answer:

He/She would first activate speech recognition in his/her PC and then connect the microphone (if there is not and inbuilt microphone) then practice with the computer.

Explanation:

6 0
4 years ago
Mikaya works in the planning department
Sonja [21]

Answer:

I don't understand need more information mate.

Explanation:

5 0
3 years ago
Read 2 more answers
In what kind of attack can attackers make use of hundreds of thousands of computers under their control in an attack against a s
Allisa [31]

Answer:

distributed denial of service

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • In order to accomplish the same goal, a person can click and hold down the mouse button and drag to the right, or hold Shift and
    5·2 answers
  • What type of computer is likely to use so-dimms, have an internal power supply, and use a desktop processor socket?
    10·1 answer
  • URLs are directions that browsers follow in order to find specific web page files. What is the first part of the URL that is the
    14·1 answer
  • Consider the markets for monitors, USB drives, central processing units, and Microsoft’s Windows. Assume monitor manufacturers u
    7·1 answer
  • If you are interested in working for a specific company, what type of job site should you look at for opening?
    15·2 answers
  • What third-party application serves as an alternative to OneNote?
    10·2 answers
  • Because floating points have decimals, they're more precise and take up more memory than integers.
    6·1 answer
  • I have a question. This question will probably be deleted, but why do moderators keep deleting my answers when they are legitima
    13·1 answer
  • (Find the number of days in a month) Write a program that prompts the user to enter the month and year and displays the number o
    8·1 answer
  • Give four example of computer virus​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!