Many admins set their firewalls to drop echo-request packets to prevent their networks from being mapped via "Ping Sweeps".
A remote possibility is that there's too many hops between the source and target and the packet's TTL expires.
Answer:
top down approach
Explanation:
Top down approach is process of breaking down system into sub-system which helps in formulating the overall system. At the end every sub system can be refined with more details.
While bottom up approach is process of gathering systems to design large complex system.
Top down is better as basic information is present and resources can be utilized effectively without impacting maintennance and operations.
Answer:
An apple a day keeps the doctor away...