1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Blizzard [7]
3 years ago
11

Ping pc-b from a command prompt window on pc-a. were the pings successful? why?

Computers and Technology
1 answer:
love history [14]3 years ago
7 0
If the pings are successful you are either on the same subnet and everything is configured correctly or ICMP echo is enabled on the router which it should be by default internally. Externally, ICMP can/should be disabled to avoid DOS attacks.
You might be interested in
When using the following symbol, there are two arrows coming out of it. One arrow corresponds to what happens in the program if
mariarad [96]

When using the following symbol, there are two arrows coming out of it. One arrow corresponds to what happens in the program if the answer to the question if it is _______YES_____ and the other corresponds to what happens next if the answer to the question is _____NO_____ .

Explanation:

When using the following symbol, there are two arrows coming out of it. One arrow corresponds to what happens in the program if the answer to the question if it is <u>Yes and the other corresponds to what happens next if the answer to the question is No.  </u>

The Below symbol(in attachment ) is used to take decisions. This decision taking step is represented as a diamond in a flowchart.

8 0
3 years ago
Options to open,save,and print a document are found on which of the following tabs? A.File B.Home C. Design D. Layout
maria [59]

Those options are usually under the "File" tab.

3 0
3 years ago
Read 2 more answers
Question 6 (1 point)
Marysya12 [62]
<h2>answers</h2>

Extranet

wifi create extranet so that our mobile network runs smoothly. it can create lan,wan also

7 0
2 years ago
show how one version of the technology is an improvement over a previous iteration of that same technology
Romashka-Z-Leto [24]
This question has a ton of answers to it but, here are some basic ideas to help you out
- Cars 1900's vs today
- Computers 1980's vs today
- Guns 1800's vs today
- Televisions 1900's vs today
- Telescopes/Microscopes
7 0
3 years ago
Which of the following best describes a proxy firewall? A. It sends traffic through another host. B. It acts as a gateway for re
12345 [234]
The answer would be B, for your computer is considered a client instead of server.
6 0
3 years ago
Other questions:
  • What CLI command can be issued in CentOS 7 to help you to see every "hop" that a connection makes, including all of the switches
    13·1 answer
  • Paulene is using this table in Word,and she started with the cursor in the box that read “Flavor”. she then hits Alt+End,The the
    7·1 answer
  • Hydraulic systems use liquids because _____.
    14·2 answers
  • A program called a ( n ) ____ translates instructions written in high-level languages into machine code.
    13·1 answer
  • Why we call the standard deviation of the sample statistic asstandard error of the statistic?
    14·1 answer
  • The process of combining rows and columns in a table is called _____.
    8·1 answer
  • Overview
    7·1 answer
  • In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyon
    10·1 answer
  • Edhesive 2.3 code practice question 1​
    11·1 answer
  • Computer Graphics:
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!