Sharing network resources requires abiding by certain constraints, as follows:
<span>Security: Organizations present ongoing opportunities for unauthorized shared resources. Security mechanisms should be implemented to provide efficient parameters.Compatibility: Various client-server operating systems may be installed, but the client must have a compatible OS or application to access shared resources. Otherwise, the client may encounter issues that create communication delays and requires troubleshooting.Mapping: Any shared OS hardware drive, file or resource may be accessed via mapping, which requires a shared destination address and naming conventions.<span>File Transfer Protocol (FTP) and File Sharing: FTP is not affected by shared resources because the Internet is FTP’s backbone. File sharing is an LAN concept.</span></span>
Answer:
B)tracert
Explanation:
Tracery Command can be regarded as
network diagnostic tool, it is used in tracking process of pathway of packet ranging from source to destination on IP network. It as well allows to know real time of each hops that are been taken by a packet as it enroutes to it's destination. The traceroute can be run by following these steps:
✓Open the run window
✓Open Command prompt, this can be done by enter "cmd" then enter.
✓ input" tracert" then destination ( Ip address or web address)
It should be noted that Tracery command issued from the command prompt will show the route that a packet travels from the issuing computer to another computer.
What they do is the answer