1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Helga [31]
3 years ago
8

10.Find the first ICMP Echo Request message that was sent by your computer after you changed the Packet Size in pingplotter to b

e 2000. Has that message been fragmented across more than one IP datagram?
Computers and Technology
1 answer:
Shalnov [3]3 years ago
6 0

Answer:

The message was fragmented across more than one IP datagram

Explanation:

ICMP Echo Request query message is a request sent by a user to a destination system, which then sends an ICMP Echo Reply query message`as a reply.

After I changed the Packet Size in pingplotter to be 2000, the first ICMP Echo Request message that was sent by the computer was:

Flags: 0×01 more fragments.

The message was fragmented across more than one IP datagram

You might be interested in
How many frequencies does a full-duplex qam-64 modem use?
Vsevolod [243]

The answer is 2 frequencies.

A Full-Duplex QAM 64 K Modem uses two frequencies. One frequency is used for upstream and the other for downstream. A variety of common QAM forms are available and include, 16 QAM, 32 QAM, 64 QAM, and 256 QAM. For example, for domestic broadcast use, 64 and 256 QAM are used for cable modem and digital cable TV. The modulation scheme for this modem uses both amplitude and phase.

8 0
4 years ago
Read 2 more answers
A(n) _____ measures the ability to juggle a variety of demands, as in a manager's job where the candidate is presented with simu
Tju [1.3M]

Answer: in-basket test

Explanation:

An in-basket test or an in-basket exercise is a test used by firms or governments in recruiting and promoting employees. During the test, job applicants receive some mails, telephone calls, documents and memos.

3 0
4 years ago
When using query by example (qbe) in the data manipulation component of a database management system (dbms), the _____ is used w
Whitepunk [10]

I guess the correct answer is AND operator

Thе AND οpеratοr is a Bοοlеan οpеratοr usеd tο pеrfοrm a lοgical cοnjunctiοn οn twο еxprеssiοns. AND οpеratοr rеturns a valuе οf TRUЕ if bοth its οpеrands arе TRUЕ, and FALSЕ οthеrwisе.

6 0
4 years ago
Give an efficient algorithm to find all keys in a min heap that are smaller than a provided value X. The provided value does not
viva [34]

Answer:

The algorithm to this question as follows:

Algorithm:

finding_small_element(element,Key xa) //defining method that accepts parameter

{

if (element.value>= xa) //check value

{

//skiping node

return;  

}

print(element.value);//print value

if (element.left != NULL) //check left node value

{

finding_small_element(element.left,xa); //using method

}

if (element.right != NULL) //check right node value

{

finding_small_element(element.right,xa); //using method

}

}

Explanation:

In the above pre-order traversing algorithm a method  "finding_small_element" is defined, that accepts two parameter, that is "element and ax', in which "element" is node value and ax is its "key".

  • Inside this if block is used that check element variable value is greater then equal to 0.
  • In the next step, two if block is defined, that check element left and the right value is not equal to null, if both conditions are true, it will check its right and left value. In this algorithm, there is no extra need for traversing items.
3 0
3 years ago
A Deep Vee hull is more likely to "capsize" (overturn) than a round bottom hull?
andrew-mc [135]
True gieofjeicjegkoekcoektkgkvnrnfkenfjenfkfj
8 0
3 years ago
Other questions:
  • In her presentation, Emily has inserted two tables in a slide and formatted the text on all slides. Which feature of the present
    12·1 answer
  • Which section of a personal narrative requires the most development
    9·1 answer
  • Why does fiber optic communication technology have a significant security advantage over other transmission technology? higher d
    6·1 answer
  • my pc wants to run the highest graphics even though I restart it everyday and it gets around 10 fps and I have a 1080 Nvidia gra
    7·1 answer
  • Is there any app that understands fake photos<br><br><br>help me i need to know it​
    9·2 answers
  • I still need help, thank you! Will give Brainliest ​
    10·1 answer
  • What equipment allows a computer to connect to the internet.
    13·1 answer
  • While storms could be a cause, power______ are more likely to be caused by disturbances from high-demand equipment in a home or
    8·1 answer
  • You want your computer to boot off of the network and have the ability to be brought out of sleep mode over the network. Which t
    5·1 answer
  • What kind of material is used for DRAM (dynamic random-access memory)?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!