1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nignag [31]
4 years ago
7

you have a small network in your business with just a few network devices connected along with 22 linux computers and you want t

o see how effeciently your network is designed. which commands can you used to from different computers to determine the route information takes from one to the other
Computers and Technology
1 answer:
alekssr [168]4 years ago
8 0

Answer: traceroute

Explanation: Hope this helps <3

You might be interested in
To simplify input management, you are asked, neglecting the handling of exceptions, to write a keyboard class so that the input
NARA [144]

Answer:

dodtzfivlxvjgippiy0fy9eyw8re7z

3 0
3 years ago
3. Write a program that inputs 4 hexadecimal digits as strings (example 7F), converts the string digits to a long – use strtol(i
never [62]

Answer:

#include <stdio.h>

#include <stdlib.h>

int main()

{

char num1[20],num2[20],num3[20],num4[20];

//Checks where the conversion of string to long stops and is required by strtol

char *ptr;

//Stores the converted number string into long.

long result_num1,result_num2,result_num3,result_num4;

//Prompt to enter all the four hexadecimal numbers.

printf("Enter the first hexadecimal number: ");

scanf("%s",num1);

printf("Enter the second hexadecimal number: ");

scanf("%s",num2);

printf("Enter the third hexadecimal number: ");

scanf("%s",num3);

printf("Enter the fourth hexadecimal number: ");

scanf("%s",num4);

//Converting the hexadecimal numbers into long using strtol() function with base 16 for hexadecimal.

result_num1 = strtol(num1,&ptr,16);

result_num2 = strtol(num2,&ptr,16);

result_num3 = strtol(num3,&ptr,16);

result_num4 = strtol(num4,&ptr,16);

//Casting the long to unsigned chars.

unsigned char numb1 = (unsigned char)result_num1;

unsigned char numb2 = (unsigned char)result_num2;

unsigned char numb3 = (unsigned char)result_num3;

unsigned char numb4 = (unsigned char)result_num4;

//Applying the boolean operation on unsigned chars and storing the resultant value in result.

unsigned char result = ((numb1&numb2)|numb3)^numb4;

//Printing the result in capital hex ("%X" take care of this).

printf("%X",result);

return 0;

}

Code OUTPUT

Enter the first hexadecimal number: 1 Enter the second hexadecimal number:2

Enter the third hexadecimal number: 3 Enter the fourth hexadecimal number: 4 Resultant Value: 7 Process returned o (0×0) execution time : 3.076 s

Press any key to continue

4 0
3 years ago
Assume that name and age have been declared suitably for storing names (like "abdullah", "alexandra" and "zoe") and ages respect
schepotkina [342]

Answer:

Explanation:

It is assumed that name and age have been declared suitably for storing names and ages. so the following is the code to read in a name  and age and printout the message "the age of name is age. "

cin >> Name;

cin >> Age;

cout << "The age of " << Name << " is " << Age << ".";

7 0
3 years ago
When working with arrays, most programming languages perform ________, which means they do not allow programs to use invalid sub
Allisa [31]

Answer:

The answer is "Option 2"

Explanation:

In the given question the answer is "array bounds checking", It Checks the limits by providing a way, that Specifies whether a value is inside those limits has been used. It is a variable, that falls into a given class or function called as an array index of array, that's why all option are wrong, that is explained as follows:

  • In option 1, It uses provides security, that's why it is wrong.
  • In option 3, It works on the bits, that's why it is not correct.
  • In option 4, It uses two thing that is "array bound checks and sub-script of bond", that's why it is wrong.

8 0
3 years ago
A word root is used to link a suffix that begins with a vowel. Which of the following words is an example of this rule? Group of
QveST [7]

Answer:

The answer is A.

Explanation:

5 0
4 years ago
Other questions:
  • What are the most significant differences among structured, object-oriented, and agile methods? what do have in common?
    10·2 answers
  • Corell Inc. has an online tool that offers a wide variety of Corell shoes for direct purchase. The tool even allows customers to
    9·1 answer
  • At the ________ level of an organization, functional managers focus on monitoring and controlling operational-level activities a
    14·2 answers
  • /*
    8·1 answer
  • LensForAll is a company that sells affordable contact lenses on its website. The CEO of the company realizes that an app must be
    9·1 answer
  • Write Python code to convert miles to kilometers. This does not need to be written in a Python function, but it should use the i
    8·2 answers
  • Network footprinting is used to ______________________. Group of answer choices test for vulnerabilities determine what services
    12·1 answer
  • Which components are involved with input? Output? Processing? Storage?
    15·2 answers
  • What is bit in computer science? (You must select all correct answers.) Hb. A. A part of a tool, such as a router. Non. B. A bas
    6·2 answers
  • Beth is a software developer who is focused on identifying early-stage interface problems. Beth addresses the dimension of usabi
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!