1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marysya12 [62]
4 years ago
5

What are two reasons for entering the ping 127.0.0.1 command on a windows pc?

Computers and Technology
2 answers:
nataly862011 [7]4 years ago
5 0

Answer:

- To check if the NIC functions as expected

- To check if the TCP/IP protocol suite is installed properly

Explanation:

Ping is a command or diagnostic tool that allows you to verify the status of a specific connection or local host. We show their uses.

If you are familiar with the language of networks it is very likely that you have encountered the letters Ping, an acronym for Packet Internet Groper, which literally in Spanish would be "network packet search."

In essence, Ping is a command or diagnostic tool that allows you to verify the status of a particular connection of a local host with at least one remote device contemplated in a TCP / IP type network.

It is used to determine if a specific IP address or host is accessible from the network or not.

The IP address 127.0.0.1 refers to localhost that is nothing other than the local host. But ... What is the local host? As the host is the way to name the team itself, a host is a computer or server ... there is no more mystery.

But let's continue with that of IP 127.0.0.1, this IP address is also known as the loopback IP address that again refers to the local host.

So what is this for? It has several applications but without a doubt the most widespread is to access services from the host itself, for example, you install a WEB service, or an FTP service on your PC and want to access the service, because from your own PC you could do it through the IP address 127.0.0.1 that points to itself, this task is usually carried out just after installing WAMP for example, once installed you open a browser and access the IP 127.0.0.1 , if everything goes well you will access your website or whatever you have installed.

Hunter-Best [27]4 years ago
4 0

127.0.0.1 is the loopback Internet Protocol (IP), the address is used to establish an IP connection to the same computer being used by the end-user.

The some reason that a person will command a ping 127.0.0.1 in a command prompt is because they will check if the NIC and drivers implementation is functional and it used in testing the TCP/IP.

You might be interested in
Professional photography is a competitive job field. <br> true <br> false
Vika [28.1K]

Answer:

True

Explanation:

5 0
3 years ago
Read 2 more answers
one_diff(a?): Description: Determine if there is exactly one character different between exactly two strings. Parameters: Determ
Vladimir79 [104]

Answer:

See explaination

Explanation:

def one_diff(s1,s2):#mthod return true if s1 and s2 has one difference

l1=list(s1)#store characters to list

l2=list(s2)

c=0

if len(l1)!=len(l2):

return False

for i in l1:

if i in l2:#for each character if it is in l1 and l2 continue

continue

else:

c+=1

if c==1:

return True#ret True if cis 1 else False

return False

def exchange(s,*k):#method that exchanges characters

l=list(k)

if len(l)!=0:#check validity of arguments

for i in l:

if i<0 and i+(2*i)>len(s):

res=s

elif i>len(s):

res=s

return res

if len(l)==0:#if no indexes are given

c1=s[0]

c2=s[-1]

res=c2

res=res+s[1:]

res=res[0]+res[1:].replace(c2,c1)

return (res)

elif len(l)==1:#if one index is given

c1=s[l[0]]

c2=s[-1]

res=''

for i in s:

if i==c1 or i==c2:

if i==c2:

res+=c1

else:

res+=c2

else:

res+=i

return (res)

else:#if two indexes are given

c1=s[l[0]]

c2=s[l[1]]

res=''

for i in s:

if i==c1 or i==c2:

if i==c2:

res+=c1

else:

res+=c2

else:

res+=i

return (res)

def is_chain(*k):#method that checks words for one difference

l=list(k)

if len(l)==0:

return False

if len(l)==1:

return True

if len(l)>1:

for i in range(len(l)-1):#for two words in l

if one_diff(l[i],l[i+1]):#call one_diff method

continue

else:

return False

return True

def scramble(s):#method that exchanges characters

i=0

while i<len(s)-1:

s=exchange(s,i,i+1)

i+=2

print(s)

please check out the screenshots in attachment.

3 0
3 years ago
What is the only true way to wipe out every possibility of the virus?
const2013 [10]

Answer: Wipe it completely clean.

Explanation: The only true way to wipe out a possible virus is to wipe a computer completely clean. When you wipe the computer clean, you are starting from scratch and have a better chance of not receiving another virus moving forward.

3 0
4 years ago
Which of the following resources can be used by an OS to communicate with hardware? (Select 2)
faust18 [17]

Answer: Device drivers and system BIOS

Explanation:

The device drivers and the system BIOS are the resources that can be use by the operating system to communicate with the hardware.

Device drivers basically provide the software interface to the hardware devices and enable the operating system and many type of program to access the different hardware functions.

BIOS stand for the basic input and output system and it basically provide the link between the software and the hardware in the system. Technically the BIOS refers to the set of the device drivers in the computer system.  

3 0
3 years ago
The actual database of Active Directory shared resources is stored on one or more computers designated as:
RideAnS [48]

Answer:

2. domain controllers.

Explanation:

  • A domain is defined as a collection of users, computers, database servers, etc that are grouped together for some common purpose.
  • The database of these shared groups and resources is stored on one or more computers known as domain controllers.
  • It is a server that manages these groups that work together on the same network.
  • It is also responsible for administrating security and managing permissions in order to control access to the resources which are shared between multiple computers and users in one or more domains.
  • These permissions involve user authentication and authorization. Domain controllers is used to acknowledge authentication requests of users by verifying their username and password.
  • Domain controllers simplify security management in larger networks.
  • However domain controller serves need more hardware and resources for the purpose of securing shared information.
5 0
3 years ago
Other questions:
  • What characteristics need to be exhibited by an organisation to improve its software process?
    7·1 answer
  • What is the definition of an extinct species?
    8·2 answers
  • Using a wireless network without the network owner's permission is known as ________.
    15·1 answer
  • A company that manufactures machine parts orders a new system that makes products at ten times the speed of the earlier machine.
    6·2 answers
  • Random letter of the alphabet for Python coding
    11·2 answers
  • What to do when you strip a screw
    10·2 answers
  • How do you think someone has programmed computer calculator?​
    13·1 answer
  • When the city of chicago buys ipads™ for its restaurant inspectors to use during their visits, the purchase from apple would be
    13·1 answer
  • I make a budget of my 1st Gamer PC its good?
    9·1 answer
  • A common business practice is to include a worksheet named Documentation that contains a description of the workbook, the name o
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!