1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksivusya [100]
4 years ago
5

A support technician uses the ping utility on a system that is online, yet no response is received. What should be allowed throu

gh a firewall, for ping to operate correctly?
Computers and Technology
1 answer:
alexgriva [62]4 years ago
4 0

Answer:

Internet Control Message Protocol (ICMP) Echo Requests

Explanation:

A system that has Windows Firewall or antivirus or other third party antivirus enabled with their configuration setting set to default, ping command from another device will not be able to see if the device with an enabled firewall is alive.

The ping command sends Internet Control Message Protocol (ICMP) Echo Request to a destination device after the destination device will reply with a Reply packet. However, by default, firewalls, such as Windows firewall blocks ICMP Echo Requests from the external network and pinging will  work when the firewall is disabled or an exception is created that lets ICMP Echo Requests pass through the firewall.

You might be interested in
Suppose you are organizing a party for a large group of your friends. Your friends are pretty opinionated, though, and you don't
Iteru [2.4K]

Answer:

Relative greedy algorithm is not optimal

Explanation:

Proving that Relative’s greedy algorithm is not optimal.

This can be further proved by the following example.

Let us assumethe friends to be invited be Ali, Bill, David, Dennis, Grace, Eemi, and Sam.

The enemy list of each friend is shown below:

• Ali: Bill. David, Dennis

• Bill: Ali, Grace, Eemi, Sam

• David: Ali, Grace, Eemi, Sam

• Dennis: Ali, Grace, Eemi, Sam

• Grace: Bill. David, Dennis. Eemi . Sam

• Eemi: Bill, David, Dennis, Grace, Sam

• Sam: Bill, David, Dennis, Eemi, Grace

From the enemy list, the one with fewer enemies is Ali.

If we invite Ali, then Bill, David, and Dennis cannot be invited.

Next person that can be invited is one from Grace, Eemi, and Sam

If we choose any one of them we cannot add any other person.

For example, if we choose Grace, all other members are enemies of Ali and Grace. So only Ali

and Grace can only be invited.

So we get a list of two members using relative’s greedy algorithm.

This is not the optimal solution.

The optimal solution is a list of 3 members

• Bill, David, and Dennis can be invited to the party.

Hence, it is proved that relative’s greedy algorithm is not optimal, where the maximum number of friends is not invited to the party.

3 0
4 years ago
What happens to weather patterns when a cold front approaches? What happens to
matrenka [14]

Answer:

The overview including its problem is listed in the explanation segment following.

Explanation:

  • The cool, unobstructed front develops whenever the cool front overwhelms the warm side or front.
  • The warm front increases over its colder, then gradually move towards the surface of the earth.

The subsequent weather system seems to be close to something like a moving warmer front.

So that the above seems to be the right answer.

4 0
3 years ago
Which group allows you to add notes to your presentation?
aleksandrvk [35]

Answer:

Presentation views

Explanation:

6 0
3 years ago
Read 2 more answers
The lower the weight of your water rocket the better it will fly. Why?
Gwar [14]

Yo, Big Shaq, the one and only

Man's not hot, never hot

Skrrat, skidi-kat-kat

Boom

Two plus two is four, minus one that's three, quick maths

Everyday man's on the block, smoke trees

See your girl in the park, that girl is a uckers

When the ting went quack-quack-quack, you man were ducking (you man ducked)

Hold tight, Asnee (my brotha), he's got the pumpy (big ting)

Hold tight, my man (my guy), he's got the frisbee

I trap, trap, trap on the phone, movin' that cornflakes

Rice Krispies, hold tight my girl, Whitney (my G)

On the road doin' ten toes, like my toes (like my toes)

You man thought I froze, I see a peng girl, then I pose (chilin')

If she ain't on it, I ghost, hah, look at your nose

6 0
3 years ago
Reggie has hired you to design a home network. The home network will share a printer but will mainly be used to stream movies to
SIZIF [17.4K]

Answer:

i think the answer is a

Explanation:

3 0
3 years ago
Other questions:
  • A user is claiming a host can be reached via the IP address but not through the name. What should a technician do first to resol
    13·1 answer
  • What does a graphic organizer do
    6·1 answer
  • I just wanted to know what are some of the challenges that could arise from setting up a file management system on a computer
    11·2 answers
  • Write a statement that declares an int variable named count.
    9·1 answer
  • g Write a program using integers usernum and x as input, and output usernum divided by x four times. For example, if the input i
    14·1 answer
  • The small gear that is driven by the motor shaft of a rotisserie is called a?
    9·1 answer
  • A Homecoming Crossword Puzzle
    12·1 answer
  • Java: Programming Question: Reverse OrderWrite a program that reads ten integers into an array; define another array to save tho
    10·1 answer
  • Hi good morning how are you all
    12·2 answers
  • 1.Which thematic group uses technology to direct the behavior of dynamical systems, ensuring that they behave in a predictable m
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!