1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ruslelena [56]
4 years ago
7

If you ping a device, you are using the __________ protocol.

Computers and Technology
2 answers:
geniusboy [140]4 years ago
7 0
Internet Control Messaging Protocol

If you use the -T switch, it'll be TCP
Anika [276]4 years ago
4 0

Answer:

Internet Control Message Protocol(ICMP)

Explanation:

If you ping a device, you are using the INTERNET CONTROL MESSAGE PROTOCOL (ICMP).

Ping works by sending Internet Control Message Protocol (ICMP) in which it send data packet request to the target host and then wait for an ICMP echo reply making you to have connection and is also a tool use to test if a host is available or if a computer is connected to a server.

Ping command can be used to test the availability of a networking on a network and to check the network error.

You might be interested in
Suppose that we want to enhance the processor used for Web serving. The new processor is 10 times faster on computation in the W
elena55 [62]

Answer:

The overall speedup gained by incorporating the enhancement is 1.563

Explanation:

Using Amdahl's Law;

The overall speedup  (N) =\dfrac{1}{(1-P) + ( \dfrac{P}{n})}

where;

P = Fraction Enhanced for Old Processor

n = speedup enhancement as a result of the new processor

P = 40% = 0.40  and n = 10

∴

The overall speedup (N) is:

=\dfrac{1}{(1-0.4) + ( \dfrac{0.4}{10})}

=\dfrac{1}{(0.6) + ( 0.04)}

=\dfrac{1}{0.64}

= 1.563

Thus, the overall speedup gained by incorporating the enhancement is 1.563

3 0
3 years ago
What is a blog . explain with example clearly .​
const2013 [10]

Answer:

A blog (a truncation of "weblog") is a discussion or informational website published on the World Wide Web consisting of discrete, often informal diary-style text entries (posts). Posts are typically displayed in reverse chronological order, so that the most recent post appears first, at the top of the web page.

Explanation:

3 0
3 years ago
Which is the purpose of adding B-Roll footage to a sequence?
pav-90 [236]

Answer:

To add richness in content – B-roll footage is used to increase the depth of the main footage and improve storytelling.

Explanation:

Hope this helps

7 0
3 years ago
Three positive impacts of computer technology in our society.​
Contact [7]

Explanation:

1. it has resulted into the manufacturing of vehicles , trains etc

2. 9through computer technology satellites have been invented to boost education through the use of Internet

3. it has improved agriculture by manufacturing machinery such as tractors, ploughs etc

7 0
2 years ago
Read 2 more answers
Which of the following will you do in step X in the following series of clicks to change the bounds of
ser-zykov [4K]

In order to change the bounds of  a chart axis after performing the aforementioned series of clicks, at step X: C. Type the number that you want in the text box.

A step chart can be defined as a line chart that uses both the vertical and horizontal lines to connect two (2) data points. Thus, it enables an end user to see the exact point on the X-axis when there is a change in the Y-axis.

In Microsoft Excel, the series of clicks that are used to change the bounds of  a chart axis are:

  • Click on chart.
  • Select chart tools and then format tab.
  • Select the current selection and then format selection.
  • Click on format axis and then axis options.
  • Click on vertical axis crosses.
  • At category number, you should type the number that you want in the text box.

In conclusion, typing the number that you want in the text box is the action that should be performed at step X.

Read more on step chart here: brainly.com/question/9737411

3 0
3 years ago
Other questions:
  • What is the most common threat on the internet? auction fraud illegal software computer viruses hackers?
    14·1 answer
  • The destination ip address is 164.109.27.233 subnet mask of 255.255.192.0 network address is
    12·1 answer
  • what are the products of light-dependent reactions? Why are they important in lighy independent reactions?​
    6·2 answers
  • How can these requirements be met? Universal Containers conduct evaluations of their sales reps using a custom object consisting
    10·1 answer
  • Which of the following is not a metamorphic agent?
    8·2 answers
  • Susan is in charge of the inventory reports for her company.She will need to find specific inventory items as well as project in
    9·1 answer
  • Two DHCP servers, Server1 and Server2, are running Windows Server 2016. As the administrator, you create a scope called Scope1.
    8·1 answer
  • What was the first e-commerce service?
    10·1 answer
  • What can be changed when a style is modified?
    5·2 answers
  • One driving technique to increase fuel efficiency is.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!