1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gregori [183]
3 years ago
13

After doing the route tracing to a particular IP addresses, paste the path of IP addresses that were taken from your IP address

to the destination. How many routing point changes were there? Are you surprised by this number? Why or why not?
Computers and Technology
1 answer:
Alexus [3.1K]3 years ago
8 0

Are you surprised by this number – yes

Why: - how the tcpip is routed to reach the destination tcpip

<u>Explanation:</u>

Normally to trace the website tcpip address end-user will use tracert command from dos command prompt. Once tracert command is executed it display the how the web site destination are routed with list of tcpip address. With each of tcpip address system will show the pinging time and in mille seconds.

In case ping tcpip is delay or disconnected then you can identify the problem and find the solution or discuss with network administrator.

For example: - tracert google.com end user will surprise with list of tcpip address.

You might be interested in
When designing a website, Claire creates a color palette for the web pages. How can the color palette help Claire design effecti
Vilka [71]
Consistency and unity
highlight important content
4 0
3 years ago
An organization is implementing a preselected baseline of security controls, but finds not all of the controls apply. What shoul
WINSTONCH [101]

The answer is Tailoring the baseline to their needs.

After an organization selects applicable security control baseline but finds not all of the controls apply, it initiates a tailoring process to modify the controls appropriately and more closely with specific conditions related to organizational missions, information systems or environments of operation. It is an integral part of the security control selection and specification and involves risk management processes like assessing, responding to, and framing.

8 0
4 years ago
Monica spent a lot of time preparing for her interview, but the hiring manager is not asking any of the questions she practiced.
AnnZ [28]
I would go with the first choice, "Be flexible and adjust to different situations."

It's best to consider beforehand different questions that might seem unlikely to come up during an interview. This way you won't be too thrown off when the conversation takes a different turn. It will also most likely appeal to the interviewer or employer when they see that you can adjust to unfamiliar situations.
4 0
3 years ago
Read 2 more answers
Which of the following is considered a skill?
faltersainse [42]
I’m not sure what are the following answers but some skills are communication, problem solving, creativity and teamwork
7 0
4 years ago
Compared with 2010, the number of mobile app users in 2011 has _____.
marta [7]

Answer:

compared with 2010, the number of mobile users in 2011 has risen with 30.2 million

Explanation:

2010 -> 62.6 million

2011 -> 92.8 million

92.8 - 62.6 = 30.2 million

4 0
4 years ago
Other questions:
  • Marijuana and hashish come from the hemp plant?
    10·1 answer
  • Collins and quillian explained the results of priming experiments by introducing the concept of _____ into their network model.
    12·1 answer
  • The manufacturer doesn't need it the buyer doesn't want it the user doesn't know they're using it
    6·1 answer
  • What is the drawback of the linear model?
    5·2 answers
  • What is the process of copying items from ram to a storage device?
    8·1 answer
  • Write an application that solicits and inputs three integers from the user and then displays the sum, average, product, smallest
    12·1 answer
  • 4. What is the simplest way to permanently get rid of an unwanted file?
    12·1 answer
  • You've finished programming the app! Now your company has to decide whether to use an open source
    6·1 answer
  • Your worksheet contains confidential information in column C; to prevent others who use your worksheet from seeing the data, you
    13·1 answer
  • For the function below, list 4 ordered pairs for that function.<br> y = 3x + 1
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!