1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ruslelena [56]
3 years ago
7

If you ping a device, you are using the __________ protocol.

Computers and Technology
2 answers:
geniusboy [140]3 years ago
7 0
Internet Control Messaging Protocol

If you use the -T switch, it'll be TCP
Anika [276]3 years ago
4 0

Answer:

Internet Control Message Protocol(ICMP)

Explanation:

If you ping a device, you are using the INTERNET CONTROL MESSAGE PROTOCOL (ICMP).

Ping works by sending Internet Control Message Protocol (ICMP) in which it send data packet request to the target host and then wait for an ICMP echo reply making you to have connection and is also a tool use to test if a host is available or if a computer is connected to a server.

Ping command can be used to test the availability of a networking on a network and to check the network error.

You might be interested in
To inspire unit 1 App
Tasya [4]
Is there more to this or ?
5 0
3 years ago
What obstacles could prevent you from getting and keeping a job
stepladder [879]
Drugs, No Collage, Gangs, bad grades, Criminal Records →
7 0
4 years ago
An _____provider is a business that provides individuals and companies access to the internet for free
boyakko [2]

Answer:A B

access provider Business that provides individuals and companies access to the Internet free or for a fee.

Explanation:

6 0
3 years ago
Read 2 more answers
Code.org lesson 8 level 5
Likurg_2 [28]

Answer:

and?

Explanation:

5 0
3 years ago
Read 2 more answers
2. Choose all of the correct answers for each of the following: [a] The relations of two sub-entity sets of the same super entit
Andrews [41]

Answer:

i say b

Explanation:

5 0
3 years ago
Other questions:
  • 4. The NIMS Management Characteristic of Chain of Command and Unity of Command means that each person: A. Continues to report di
    9·1 answer
  • What is a gutter margin?
    5·2 answers
  • Dimensional arrays can be created using loops. 2 dimensional arrays can be created using:
    10·1 answer
  • BUURTAIS
    7·1 answer
  • (I need help also can u guys just give me some example just in case I got confuse)
    13·1 answer
  • Please choose the correct citation for the case which established the "minimum contacts" test for a court’s jurisdiction in a ca
    10·1 answer
  • Help me please. I dont really understand this.
    12·2 answers
  • What symbol should you look for to determine who owns the intellectual property of a website? the logo the web address the domai
    7·2 answers
  • Advantages of using Unicode to represent data
    8·1 answer
  • What is the accurate description
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!