1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shalnov [3]
3 years ago
12

ICMP

Computers and Technology
1 answer:
sp2606 [1]3 years ago
6 0

Answer:

(b) is used in Traceroute

(d) is used by Ping

Explanation:

ICMP is the short form of Internet Control Message Protocol. It is a protocol used by networking devices such as routers to perform network diagnostics and management. Since it is a messaging protocol, it is used for sending network error messages and operations information. A typical message could be;

i. Requested service is not available

ii. Host could not be reached

ICMP does not use ports. Rather it uses types and codes. Some of the most common types are <em>echo request</em> and <em>echo reply.</em>

<em />

Traceroute - which is a diagnostic tool - uses some messages available in ICMP (such as <em>Time Exceeded</em>) to trace a network route.

Ping - which is an administrative tool for identifying whether a host is reachable or not - also uses ICMP. The ping sends ICMP <em>echo request </em>packets to the host and then waits for an ICMP <em>echo reply</em> from the host.

ICMP is not required to solve NAT traversal problem neither does it have a new version in IPV6.

You might be interested in
Worms often try to disguise from where they are sending data by using a bogus ip addresses instead of using an authorized ip add
Katyanochek1 [597]

If the question is asking whether it is true or false, the answer is false because worms are not responsible for disguising when they are sending data by using bogus ip addresses but it is the Trojan horses in which they are the one responsible for misleading users from the true intent or the real data.

5 0
3 years ago
Select all that apply.
Serhud [2]

Answer:

Page grouping

Page Setup grouping

Layout grouping

Schemes grouping

4 0
3 years ago
Use______ to format cells when they meet a certain criteria.
olchik [2.2K]
Data Calculations

Good luck
7 0
3 years ago
True or false?
mylen [45]

Answer:

true

Explanation:

sometimes you've just gotta roll with it. the final parts of the statement is what gives away the answer.

3 0
3 years ago
what is the role of media in our society, and how can we become responsible consumers producers of news and information in the d
alexira [117]

1.Own your image, personal information and how these are used.Pay close attention to the 2.Terms of Use on apps and websites. ...

3.Obtain permissions when posting videos or 4.images of others on your networks. ...

Scrub your accounts. ...

5.Password diligence. ...

Spread love, not hate.

7 0
3 years ago
Other questions:
  • Which of the following techniques has to do with how the people who make the commercial manipulate the way it looks?
    8·1 answer
  • What does a computer user need to know about programming in order to play a video game?
    6·2 answers
  • Which of the following best describes Roblox?
    12·2 answers
  • Consider the markets for monitors, USB drives, central processing units, and Microsoft’s Windows. Assume monitor manufacturers u
    7·1 answer
  • What option from the format tab should you use to remove unwanted parts of a picture
    8·1 answer
  • Mobile cameras are now of a higher quality than when they first arrived on the market. Describe the difference in
    5·1 answer
  • Which SCSI standard allows for the technique known as “hot swapping”? Ultra SCSI Original SCSI Serial SCSI Fast-Wide SCSI
    5·1 answer
  • The original creators of Android were ____________.​
    8·1 answer
  • The main work area of the computer is the
    14·2 answers
  • someone please do this for and send a screeshot or picture please its really important for my examsss :D​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!