1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ruslelena [56]
4 years ago
7

If you ping a device, you are using the __________ protocol.

Computers and Technology
2 answers:
geniusboy [140]4 years ago
7 0
Internet Control Messaging Protocol

If you use the -T switch, it'll be TCP
Anika [276]4 years ago
4 0

Answer:

Internet Control Message Protocol(ICMP)

Explanation:

If you ping a device, you are using the INTERNET CONTROL MESSAGE PROTOCOL (ICMP).

Ping works by sending Internet Control Message Protocol (ICMP) in which it send data packet request to the target host and then wait for an ICMP echo reply making you to have connection and is also a tool use to test if a host is available or if a computer is connected to a server.

Ping command can be used to test the availability of a networking on a network and to check the network error.

You might be interested in
A concave lens is also called a diverging lens. please select the best answer from the choices provided t f
nlexa [21]

The answer is true because a concave lens is also called a diverging lens.


5 0
3 years ago
8. Which of the following is an output device
Fynjy0 [20]
<h2>Hey there!</h2>

<h3>Printer is an output device. </h3>

<h2>Explanation:</h2>

<h3>CD - We insert CD,so it is an input device.</h3>

<h3>Hard Drive - It is responsible for the memory of the computer, so it also an input device. </h3>

<h3>Joystick - It is used to play games on a computer, it inputs instructions through which a game/games can be played. So,it an input device.</h3>

<h3>Printer - It is used to print out the hard copies from a computer,like pages etc..</h3>

<h2>Hence, the correct option will be </h2>

<h3>D. printer </h3>

<h2>Hope it helps </h2>

7 0
2 years ago
Which best describes this future of. Employment in the. Energy career cluster
Aloiza [94]

Answer:its A

Explanation:

just took the quiz

3 0
3 years ago
The __________ process is designed to find and document vulnerabilities that may be present because there are misconfigured syst
Roman55 [17]

answer.

I don't know what it is

8 0
3 years ago
Prove whether each argument is valid or invalid. First find the form of the argument by defining predicates and expressing the h
SSSSS [86.1K]

Answer:

The given argument  ∀x (S(x) ∧ (M(x) V D(x)) --> ¬ A(x)) ∧ S(Penelope) ∧ A(Penelope) -->¬ D(Penelope) is valid.

Explanation:

Solution:

Let us Consider following predicates:

M(x): x missed the class

D(x): x got a detention

S(x): x is a student in the class

A(x): x got an A

Now,

We Express the hypotheses and conclusion as:

The hypotheses: ∀x (S(x) ∧ (M(x) V D(x)) -->  A(x)) and S(Penelope) and A(Penelope)

So,

The Conclusion:  D(Penelope)

Thus,

The Argument:

∀x (S(x) ∧ (M(x) V D(x)) -->  A(x)) ∧ S(Penelope) ∧ A(Penelope) -->D(Penelope)

Then,

The given argument is valid or correct and prove using the inference  rule as follows:

Step                      Premises                    Reason (Rule used)

1.  ∀x (S(x) ∧ (M(x) V D(x)) -->  A(x))                Premise

2. S(Penelope) ∧ (M(Penelope)

  V D(Penelope)) --> ¬ A(Penelope)            Universal instantiation

3.  S(Penelope)                                              Premise

4.  A(Penelope)                                              Premise

5. ¬[S(Penelope) ∧ (M(Penelope)

  V D(Penelope))]                                         2,4, Modus Tollens

6. ¬S(Penelope) V (¬M(Penelope)

  ∧ ¬D(Penelope))                                        De Morgan law

7.¬M(Penelope) ∧ ¬D(Penelope)                 3,6,Disjunctive Syllogism

8¬D(Penelope)                                              7, Simplification

Therefore, the given argument ∀x (S(x) ∧ (M(x) V D(x)) --> ¬ A(x)) ∧ S(Penelope) ∧ A(Penelope) -->¬ D(Penelope) is valid.

3 0
4 years ago
Read 2 more answers
Other questions:
  • The ListIterator interface
    13·1 answer
  • Jamie works on a spread sheet in which he has to label stes of data. How can he navigate between the cells in the spread sheet
    8·1 answer
  • In which of the following stages of the development process is a team MOST likely to interview a potential user of an app?
    6·1 answer
  • Adding _______ around calculations indicates which calculations should be performed first before following the typical order of
    6·2 answers
  • printArray is a method that accepts one argument, an arrayof int. The method prints the contents of the array; it does not retur
    5·1 answer
  • A firm has a huge amount of individual customer data saved in different databases. Which of the following can be used to integra
    11·1 answer
  • What is ‘Software Quality Assurance’?
    10·1 answer
  • 9.6 Code Practice<br> Instructions<br> 1<br> Declare a 4x 5 array called N<br><br> Please helppp
    9·1 answer
  • Name at least 3 different portable computer devices that can be purchased
    15·2 answers
  • is a programming model that focuses on an application's components and data and methods the components use. Group of answer choi
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!