1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pavel [41]
3 years ago
6

From your computer you are able to establish a telnet connection to a remote host but a traceroute to the host IP address result

s in a request timeout. Why may be this be?
Computers and Technology
1 answer:
Tanya [424]3 years ago
8 0

Mostly firewalls may protect trace route to the host IP address.

<u>Explanation:</u>

When telnet has established the connection to a remote host. Then kindly check the host IP address and their gateway settings.  

If any resident firewall such as antivirus is stopping the ping method or gate way firewall is protecting both ends during trace route. Once the connection is established don’t worry about trace route on host IP  address.

Kindly check where the disconnections happens during the trace route.  in case it happens in between then they're stability on the connection issue which should be solved immediately.

You might be interested in
The weakest hydrogen line stars are classified as:
Ostrovityanka [42]
O is the weakest hydrogen line
7 0
4 years ago
Read 2 more answers
Match the following Microsoft Windows 7 ​
Dominik [7]

Answer:

Explanation:  will be still function but Microsoft will no longer provide the following: Technical support for any issues

6 0
3 years ago
Which is not covered under the Computer Access Device and Computer Fraud and Abuse Act (CADCFA)? unauthorized use of federal com
Mazyrski [523]

Answer:

The correct answer to the following question is "Typewriters".

Explanation:

CADCFA seems to be the very first provision of federal laws to specifically concentrate on computer assault. These clauses continued to allow corporations to prosecute unjust workers for compensation for the misuse of confidential or sensitive information.

  • Even though we all agree that sometimes a federal worker uses the typewriters in the abundance of power, that's why it's not protected by that same act.
  • The other options are incorrect because they are all known and are covered for that given CADCFA act.
5 0
3 years ago
Prove whether each argument is valid or invalid. First find the form of the argument by defining predicates and expressing the h
SSSSS [86.1K]

Answer:

The given argument  ∀x (S(x) ∧ (M(x) V D(x)) --> ¬ A(x)) ∧ S(Penelope) ∧ A(Penelope) -->¬ D(Penelope) is valid.

Explanation:

Solution:

Let us Consider following predicates:

M(x): x missed the class

D(x): x got a detention

S(x): x is a student in the class

A(x): x got an A

Now,

We Express the hypotheses and conclusion as:

The hypotheses: ∀x (S(x) ∧ (M(x) V D(x)) -->  A(x)) and S(Penelope) and A(Penelope)

So,

The Conclusion:  D(Penelope)

Thus,

The Argument:

∀x (S(x) ∧ (M(x) V D(x)) -->  A(x)) ∧ S(Penelope) ∧ A(Penelope) -->D(Penelope)

Then,

The given argument is valid or correct and prove using the inference  rule as follows:

Step                      Premises                    Reason (Rule used)

1.  ∀x (S(x) ∧ (M(x) V D(x)) -->  A(x))                Premise

2. S(Penelope) ∧ (M(Penelope)

  V D(Penelope)) --> ¬ A(Penelope)            Universal instantiation

3.  S(Penelope)                                              Premise

4.  A(Penelope)                                              Premise

5. ¬[S(Penelope) ∧ (M(Penelope)

  V D(Penelope))]                                         2,4, Modus Tollens

6. ¬S(Penelope) V (¬M(Penelope)

  ∧ ¬D(Penelope))                                        De Morgan law

7.¬M(Penelope) ∧ ¬D(Penelope)                 3,6,Disjunctive Syllogism

8¬D(Penelope)                                              7, Simplification

Therefore, the given argument ∀x (S(x) ∧ (M(x) V D(x)) --> ¬ A(x)) ∧ S(Penelope) ∧ A(Penelope) -->¬ D(Penelope) is valid.

3 0
4 years ago
Read 2 more answers
Which part of a window lets you see a fileâs contents without opening the file?
Artyom0805 [142]
The preview pane. On the right hand side of the file explorer.
3 0
3 years ago
Other questions:
  • Why does the hp computer not have Bluetooth?
    6·1 answer
  • You have connected thirteen pcs and laptops to a wireless network. to make your wlan more secure, what should you do to disallow
    11·1 answer
  • According to the video, who is the most common employer for Foresters?
    14·2 answers
  • How much do taxis coast?
    14·2 answers
  • Whats the difference between firms that provide services and firms that sell products?
    7·2 answers
  • Labor-augmenting technology causes which of the following?(i) The marginal productivity of labor increases.(ii) The marginal pro
    7·1 answer
  • In 1997, microsoft was accused of using a monopoly in operating systems to control the market for _____.
    8·2 answers
  • You are a cleared employee. Your friend called and told you that he saw information about the classified XYZ program on the Inte
    10·1 answer
  • Write a function that receives an integer (n) argument and then computes the following based on the value of the integer: While
    13·1 answer
  • Digital computers use a........ system to encode date and programs.<br>​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!