When you send an echo request message with the ping program, a successful attempt will return a(n) ______ message.

Answers

Answer 1

Answer:

echo reply

Explanation:

It is a test that a user performs to confirm that remote system is up and running on the network. This is needed when basic connectivity failure problem appears. Internet Control Message Protocol  renders 2 messages for this service which are Echo Request and Echo Reply. Echo Request is a request sent to a destination device. This system acknowledges with an Echo Reply message. Echo request is generated by destination system with PING program. Ping program is used for testing basic connectivity. An echo reply is sent by target system to the requesting system acknowledging that the echo request has been received.


Related Questions

Henry is having a problem with the electrical system on his current laptop. The battery for the laptop will not charge. Henry took the AC adapter and battery from another laptop that is known to work, and put them in his current laptop, but still the battery will not charge.

Answers

Answer:

There is a short circuit in a component in the power circuit.

Explanation:

The power circuit in a computer system, regulates, rectifies and steps down power and voltage entering the main motherboard.

When a power surge capable of damaging the motherboard occurs, A component in the power circuit is shorted, not allowing the dangerous power to pass.

This can be troubleshooted by passing a high current, since the shorted component has a high emf. It over heats and is detected and changed.

Which is true about the differences between a port replicator and a docking station?
Both have expansion ports
Neither have expansion ports
Only docking stations have expansion slots
Only port replicators have expansion slots

Answers

Answer:

The answer is 'D'- only port replicators have expansion slots.

Explanation:

A port replicator is a kind of attachment which allows multiple devices to be attached to the laptop through a simple USB. The devices can be a monitor, printer, large monitor, keyboard etc.

On the other hand a docking station allows portable computers to be connected to other hardware devices and get converted into a desktop system. Docking station can be plugged  hot or cold. Cold docking is carried out when the system is shut down and hot docking occurs when the system is still running and the docking station is connected.

What framework ensures customers that the products they are buying have been evaluated and that the vendor's claims have been verified?

Answers

Answer:

Common criteria assurance

Explanation:

Common criteria assurance:- It guarantees that a computer safety product has been rigorous, standardly and repeatably defined, applied and evaluated in a way that preserves the target environment for use.

Pre-certification assessments are extensive and it includes the following levels:-

security targetprotection profilesecurity functional requirementssecurity assurance requirementsevaluation assurance level

Google's Chrome OS integrates with web servers using cloud computing and storage to run applications and to perform other functions.True / False.

Answers

Answer:

True.

Explanation:

Google's chrome is a web browser, used to surf the internet. But this is not its only feature. google's chrome runs several applications like google's map,Google's mail,play store, translate, photos,duo etc, all in the google's chrome platform.

A user must sign in to use its services, which are running directly from the cloud. Every data generated from this services are stored in the cloud.

What controls network connectivity such as Wi-Fi and the GPS locator in a mobile device?
IMEI
IMSI
PRL
Radio firmware

Answers

Answer:

Radio Firmware

Explanation:

Radio Firmware is a hardware in a smartphone or tablet that control network such as wifi and gps.

which of these variable declarations will the variable remain uninitialized unless it is explicitly initialized?1)Declaration of an instance variable of type int.2)Declaration of a static variable of type float.3)Declaration of a local variable of type float.4)Declaration of a static variable of type Object.5)Declaration of an instance variable of type int[].

Answers

Answer:

Option 3: Declaration of a local variable of type float

Explanation:

In Java programming, a local variable doesn't possess a default value. This means a value must be explicitly initialized to the local variable before it can be used.

The instance variable and static variable, on another hand, have default value which is dependent on the data type. For example, an instance or a static variable of type int is 0. If the data type is boolean, the default value is false.

Lisa manages incident response for a bank. The bank has a website that’s been attacked. The attacker utilized the login screen, and rather than entering proper login credentials, the attacker entered some odd text: ‘ or ‘1’=’1. What is this attack known as?A) Cross-site scriptingB) Cross-site request forgeryC) SQL injectionD) ARP poisoning

Answers

Answer:

The answer is C) SQL Injection

Explanation:

Cross-Site Scripting (XSS) attacks are a type attacks that occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.

Cross-Site Request Forgery (CSRF) is a type of attacks specifically target state-changing requests, not theft of data, since the attacker has no way to see the response to the forged request.

SQL Injection is a type of cyber security attack where an attacker inputs a malicious input into an SQL statement., and the SQL server reads it as programming code.

Address Resolution Protocol poisoning (ARP poisoning) is a form of attack in which an attacker changes the Media Access Control (MAC) address and attacks an Ethernet LAN by changing the target computer's ARP cache with a forged ARP request and reply packets.

From the above brief definition; it is seen that the answer is C) SQL Injection.

An engineer is working for a large scale cable TV provider that requires multicast on multisourced streaming video but must not use any rendezvous point mechanism. Which multicast protocol must be configured?
A. PIM-SMB. SSMC. BIDIR-PIMD. ASM

Answers

Answer:

D. ASM

Explanation:

There are three types of transmission, namely;

Unicast, Multicast and broadcast.

Multicast is a form transmission where packets are sent to a specific group of computers in a network. It can be a one to many or a many to many transmission. There are different types of multicast transmission, they are,

ASM (Any source multicast transmission)

SSM ( Source specific multicast transmission) etc.

ASM and SSM are opposite in their functions, as ASM transmits multicast packets from multiple sources without using any rendezvous point, but SSM only transmit from a specified source address.

You can copy a selected shape by holding down the ____ key and then dragging the shape.
A_[Ctrl]
B_[Esc]
C_[Alt]
D_[Tab]

Answers

Answer:

Option A is the correct choice answer for the above question.

Explanation:

In an MS-Powerpoint document, when a user wants to copy the selected shape and drag that shape for use in slides then he needs to--

Select the shape Press the Ctrl key and drag that shape on the slide of the powerpoint.

Then the user gets the shape on the slide for their personal use.

The question scenario also suggests the same which is described above. hence Option A is the correct answer while the other is not because--

Option B suggests 'ESC' which is used to escape any running program.Option C suggests about ALT key which is of no use for the MS-Powerpoint document.Option D suggests about TAB key which is used to make the space between two texts or diagram.

Answer:A

Explanation:

Ctrl c is copy

A message-passing model is ____.

A) easier to implement than a shared memory model for intercomputer communication
B) faster than the shared memory model
C) a network protocol, and does not apply to operating systems
D) only useful for small simple operating systems

Answers

Answer:

easier to implement than a shared memory model for inter computer communication.

Explanation:

Message passing model is used to send messages to multiple users at a time. All the message have been stored in Queue and stored until all messages delivered to recipient.

The components of the 4-term contingency include:_________
A. Discriminative stimulus, the behavior, the reinforcer, the consequence
B. Motivating operation, discriminative stimulus, the behavior, the consequence
C. Motivating operation, prompts, behavior, the consequence
D. Motivating operation, discriminative stimulus, prompts, behavior

Answers

Answer:

The correct option is B: Motivating operation, discriminative stimulus, the behavior, the consequence

Explanation:

A 4-term contingency is regarded as an important factor when trying to understand behavior and why that behavior was exhibited as identified in Grafton's philosophy. The Four terms include the behavior, Antecedents (also known as the discriminative stimulus), the consequences of the behavior, and the fourth piece which is sometimes forgotten; the motivation behind the behavior.

The labels on the tab buttons on the Driver tab of the Windows Device are Driver Details, Update Driver, Roll Back Driver, Uninstall, and ____________ .

Answers

Answer:

Disable

Explanation:

Windows Device Manager Properties:

It provides access to you of your installed hardware as well as corresponding installed software and also provide you with options to change its properties.

The option tabs that you will find for each device in your hardware includes;

1. Driver details: To view the details of currently installed drivers.

2. Update Drivers:  To update the driver software and start driver update wizard .

3. Roll Back Driver: Just in case if updating the drivers caused malfunction, then you can get back to the previously installed drivers without having to manually install the drivers again.

4. Uninstall: To completely uninstall all the drivers associated with the device .

5. Disable: To disable the device, if you want to use the device again then you have to enable it.

k-means clustering is the process of a. reducing the number of variables to consider in data-mining. b. agglomerating observations into a series of nested groups based on a measure of similarity. c. organizing observations into distinct groups based on a measure of similarity. d. estimating the value of a continuous outcome variable

Answers

Answer:

c. organizing observations into distinct groups based on a measure of similarity

Explanation:

In the field of data science and machine learning, clustering is a technique that is used to identify sub-groups within a data set. This subgroups are called clusters because they share similarities. K-means is one technique of clustering where the algorithm iteratively tries to divide the data into a pre-defined K subgroup. k-means ensures that each data-point belongs to only one sub-group (cluster) and data-points in same cluster are as similar as possible.

Final answer:

K-means clustering is the process of organizing observations into distinct groups based on a measure of similarity.

Explanation:

K-means clustering is the process of organizing observations into distinct groups based on a measure of similarity. It does not reduce the number of variables or estimate the value of a continuous outcome variable, nor does it agglomerate observations into nested groups. The algorithm assigns each point to exactly one cluster based on their attributes, aiming to create the most compact clusters possible.

In order for the computer to accurately locate the appropriate anatomy, the part must be centered to the cassette and at least _______ sides of collimation detected.
A. 1
B. 2
C. 3
D. 4

Answers

Answer:

C. 3

Explanation:

In order for the computer to accurately locate the appropriate anatomy , at least three sides are required and it will allow the computer to locate the exposed area on the image plate.

____________ occurs when a provider does not support data export or when a provider's service is unavailable through others.

Answers

Answer:

The correct answer to the following question will be Vendor Lock-In.

Explanation:

Vendor Lock-In: It is also known as Customer Lock-In. The Vendor Lock-In makes the costumer depends on services and products on the vendor. The costumers are not able to use another vendor without changing costs as it creates barriers.

Some ways to avoid Vendor Lock-In, these are as follows:

Design your application portable.Keep watching vendor contracts.Arrange both entry and exit with your vendor.

Where can sales professional find the most complete, up-to-date information for the tcuv program?

Answers

Answer:

At Toyota certified site

Explanation:

You need to move to the Toyota certified site. This is an insurance program ran by Toyota, and as a sales professional, you are certainly going to require the details about the Tcuv program. At this site, you can find complete detail about the program. And a complete and detailed knowledge is a must for you to rise as a sales professional. And for that, you need to visit the above site.

The privilege-based issuance model provides for the ongoing qualification of individuals by testing, and for the ongoing monitoring of driver performance.

A. True
B. False

Answers

Answer:

True

Explanation:

Truly, the privilege-based issuance model provides for the ongoing qualification of individuals by testing, and for the ongoing monitoring of driver performance.

Final answer:

False, The assertion in Exercise 1.2.2 is false; both models and theories can be scientifically tested. Models serve as simplifications or representations of reality and are used in many scientific fields, such as environmental science, to understand and predict phenomena.

Explanation:

The statement regarding the privilege-based issuance model is not relevant to Exercise 1.2.2, which asks about the testability of models versus theories. The correct answer to Exercise 1.2.2 is B. False. While there is often confusion between models and theories, it is important to clarify that both can be scientifically tested. Models are simplifications or representations of reality and are used to understand, explain, or predict phenomena within specific domains. Models can be conceptual, physical, mathematical, or computational, and they are indeed subject to testing against empirical observations and experiments.

A common example is the climate model used in environmental science, which scientists use to predict climate changes based on various parameters. These models are continually tested with new data to refine predictions and understand the climate system better.

Eamon plans to operate three warehouses, in different cities, to support his business. To find the exact location of a product, he wants to establish a code that identifies a product’s warehouse location, floor number, section number, aisle number, and bin number. By doing this, he can ship the ordered products faster. Which of the following codes would you suggest Eamon to use?A• Significant digit codeB• Block sequence codeC• Action codeD• Sequence code

Answers

Answer:

Significant digit code

Explanation:

Significant digit code is a kind of coding system which brings ease of locating items in a pool of items by providing parameters that makes finding the item's precise location easier. this can shorten time taken to find item especially when turn around time is supposed to be little.

You are evaluating the bounce rate of your overall website traffic and find that users with a social media referral source have a higher bounce rate. Which user experience principle will help to keep social media visitors engaged on your website?

Answers

Answer:

On social media, we can engage more visitors on our post bu creating relevant post that interacts and attracts the users.

Explanation:

On internet and social media, the only thing that increase the traffic on website is the content of website or post. As much as the content is relevant and good more number of users visit the website. Frequency(No. of post a day) of Post is also an important factor in arriving and engagement of visitors on web page or post.

The process of capturing moving images on film or a digital storage device is called?

Answers

Answer:

Cinematography

Explanation:

Cinematography is the blend of art and science and it deals with the recording of moving images on film or a digital storage device.

While making a movie some example of cinematography are the conclusions reached about lighting, camera filters, lenses etc.

You ask your secretary to send information on the meetings that you need to attend in the month. He provides you the details immediately, but he leaves out certain additional details that he deems to be surplus to your requirements. Judge your secretary's action.A) The information that your secretary provided was partly good as it was timely,but insufficient. B) The secretary provided adequate and timely information,but the information did not add value to you. C) The information that your secretary gave will be considered as good information. D) The infortation that you obtained through the secretary was not timely and worth its cost.

Answers

Answer:

Option A is correct

Explanation:

It was good because it was timely but insufficient because am in the position to dim any information surplus and I never directed the secretary to prone down on a need bases which makes it insufficient, but it can be rewritten and all information added before time of meeting that is why it's timeliness makes the report good.

Harold cannot increase the width of his worksheet because, if he does, he will not be able to print it on one sheet. However, his columns are truncating his content. What solution would be the best for Harold to use to make all his text visible without losing data?

Answers

Answer:

Harold choose Wrap text for the columns.

Explanation:

Harold has to choose Wrap text for the columns, if he not choose then he lost their data.

Firstly, select the column in which you want to use wrap text.Then, click the right button from the mouse and some options appear and click on the Format cell.Then, a prompt of Format Cell will appear then, you have to click on the Alignment tab then, click on the checkbox of the Wrap Text.Finally, you have to come back on your sheet and then you see that the following selected texts should wrapped.

If you're looking to install Gigabit Ethernet, what cabling system would you use?

A. coaxial
B. thinnet
C. Cat-6
D. RG-59

Answers

Answer:

The correct answer to the following question will be option c. Cat-6.

Explanation:

Cat-6: A standard version of twisted pair cable for physical layer of networking and for Ethernet is, Cat-6 (Category 6) cable.

Cat-6 will be adaptable with the Category 5/5e and 3 standard of cables, and the standard specifies the performance of cable compared to 100 MHz up-to 250MHz for Cat 5/5e.So, if you are looking for the best cabling system to use while installing the Gigabit Ethernet, Category 6 will be the suitable one.

Mark noticed that one of the employees at his company tethers to his smartphone to bypass corporate web security to access prohibited websites while still being connected to the LAN. What is the best way to prevent this?

Answers

Answer:

Implement a policy that prohibits tethering

Explanation:

A policy that prohibits tethering should be implemented here, and a consequence is needed to be enforced.

What in the LAN for a small office, some user devices connect to the LAN using a cable, while others connect using wireless technology (and no cable). which of the following is true regarding the use of ethernet in this LAN?

Answers

Answer:

The ethernet protocol IEEE 802.3 is only meant for cable networks.

Explanation:

In this scenario, there are two types of networks, namely;

LAN and WLAN.

A LAN (local area network) is a network within a small area like a  building, i which its workstation are connected using cables. The cabled network instantly use a protocol called Ethernet also known as IEEE 802.3.

WLAN (wireless local area network) is a small area network just like the LAN, but the difference is that its workstation are connected wireless (without cable). wireless networks uses wifi or 802.11a/n/g to connect to the network.

So, the ethernet protocol represents the cabled network, Wifi represents the wireless network.

Which type of drawer has three dispensing modes: single-dose, multi-dose, and matrix?

A. Matrix Half-height smart
B. CUBIE Full-height smart
C. CUBIE MiniDrawer Bin

Answers

Answer:

CUBIE MiniDrawer Bin

Explanation:

MiniDrawers comes in two configurations, and each fitting comes in one drawerslot. The MiniDrawer (1-6) comes with the most primary pocket dimensions. And we have the 18-tray MiniDrawer (1-8) comes with another dimensions in its basic form. You will in fact find various pocket dimensions like 1,2,3,4,6,12, and these comes within the 18-tray and 6-tray MiniDrawers. And they come in all the dispensing modes mentioned in the question. Hence, the above answer. The answer is clear from the options as well, and since it has the matrix mode as well apart from single dose mode and multi dose mode.

The drawer with three dispensing modes: single-dose, multi-dose, and matrix, is the CUBIE MiniDrawer Bin (option C). These modes provide flexibility in dispensing medications efficiently.

If you're looking for a drawer with three dispensing modes: single-dose, multi-dose, and matrix, the correct type is the CUBIE MiniDrawer Bin.(option C)These dispensing modes allow for various ways to manage and dispense medications in a medical setting with flexibility and efficiency. For example, the single-dose mode dispenses one unit at a time, the multi-dose mode allows multiple units, and the matrix mode provides a grid structure to dispense items from specific locations within the drawer.

Hypertext Markup language (HTML) version _____ added support for style sheets to give web designers greater control over page layout and appearance.

Answers

Answer:

4.01 version .

Explanation:

A hypertext Markup language is used for designing the web page when we added the CSS on the web page we can create the web page more efficient manner and also there is more control over the web page because we can easily call the classes of CSS.

The Hypertext Markup language version 4.01 provides greater flexibility on the web page also We can also control the page layout in a very easy manner. The appearance of the web page is good as compared to version HTML 4

Buttons for frequently used commands such as ____ are found on the Standard toolbar.​
a. ​Cut
b. ​Open Project
c. Save
d. ​Paste

Answers

Answer:

In the given question all options are correct.

Explanation:

An office software provides a standard toolbar to edit the document. This software works on graphical mode means that to edit anything we do not write code. we simply use click on button or drag and drop options. In this question all options is correct, that can be described as:

Option a and Option d both work together because When we use "Cut" that is used for cut(delete) data. and "paste" is used to insert data into the document or a page.In option b, an Open project is a button that is used to open a new project.In option c, Save is a button that is available in the office menu and it is used to save a file.

In Microsoft Excel, you have a large dataset that will print on several pages. You want to ensure that related records print on the same page with column and row labels visible and that confidential information is not printed. You should apply all of the following page setup options except which one to accomplish this?A. Set a print areaB. Print titlesC. Adjust the page breaksD. Change the print page order

Answers

Final answer:

To print related records on the same page with visible labels and exclude confidential data, set a print area, print titles, and adjust the page breaks. Do not change the print page order, as it does not help with these printing goals in Excel.

Explanation:

To ensure that related records print on the same page with column and row labels visible and that confidential information is not printed in Microsoft Excel, you would apply the following page setup options:

Set a print area to define the specific area of the worksheet that you want to print.Print titles to repeat specific rows or columns on every page, ensuring labels are visible across all printed pages.Adjust the page breaks to control where pages begin and end, which helps to keep related records together.

The page setup option you should not apply is:

Change the print page order. This option changes the sequence in which pages are printed and does not assist in keeping related records together or ensuring that confidential information is omitted from the printout.

By using the Page Layout tab, you can make adjustments like changing to landscape orientation or narrowing margins, which can help fit more data on each page. Using these settings effectively will help ensure your data prints out clearly and efficiently.

Some IOS commands store passwords as clear text, but you can then encrypt the passwords with the service password-encryption global command. By comparison, other commands store a computed hash of the password, rather than storing the password. Comparing the two options, which one answer is the most accurate about why one method is better than the other?
A. Using hashes is preferred because encrypted IOS passwords can be easily decrypted.B. Using hashes is preferred because of the large CPU effort required for encryption.C. Using encryption is preferred because it provides stronger password protection.D. Using encryption is preferred because of the large CPU effort required for hashes.

Answers

Answer:

A

Explanation:

Using hashes is preferred because encrypted IOS passwords can be easily decrypted.

Other Questions
Any violation of the conditions necessary for Hardy-Weinberg equilibrium can result in:_________. Suppose the market demand for pizza is given by:Qd = 300 - 20PQs = 20P - 100 where P = price (per pizza).1. Suppose the price of hamburgers, a subsitute for pizza, doubles. This leads to a doubling of the demand for pizza. (At each price, consumers demand twice as much pizza as before.) Write the equation for the new market demand for pizza. A cell phone plan cost $200 to start. Then there is a $50 charge each month. 1. what is the total cost (start up fee and monthly charge) to use the cell phone plan for 1 month?2. what is the total cost for x months? Would it be C???...idkHELP Which of the following is an example of strategic entry deterrence?A. building excess capacityB. price reductionsC. economies of scaleD. both b and cE. both a and b Problem 4: A mass m = 1.5 kg hangs at the end of a vertical spring whose top end is fixed to the ceiling. The spring has spring constant k = 95 N/m and negligible mass. The mass undergoes simple harmonic motion when placed in vertical motion, with its position given as a function of time by y(t) = A cos(t ), with the positive y-axis pointing upward. At time t = 0 the mass is observed to be at a distance d = 0.35 m below its equilibrium height with an upward speed of v0 = 6 m/s. A manufacturer of cereal has a machine that, when working properly, puts 20 ounces of cereal on average into a box with a standard deviation of 1 ounce. Every morning workers weigh 25 filled boxes. If the average weight is off by more than 1 percent from the desired 20 ounces per box, company policy requires them to recalibrate the machine. In a sample of 100 days where the machine is working properly all day, on how many of the days is it expected the machine will be recalibrated? What is a fracture and what are its types Which of the following is not part of feminist psychology? a. questioning the practice of science itself when it is male biased b. discovering the contributions of women to psychology c. favoring women over men d. studying psychological gender differences Which function has a range of vy s 5)?of(x) = (x - 4)2 + 5O (x) = -(x - 4)2 + 5o f(x) = (x - 5)2 + 4Of(x) = -(x - 5)2 + 4 Jack claims that Pluto has five moons: Charon, Nix, and Hydra, Kerberos, and Styx. Jill disagrees with Jacks claim, insisting that Nix, Hydra, Kerberos, and Styx are actually moons of both Pluto and Charon. From an objective perspective, which claim makes more sense based upon our external view of the Pluto-Charon system? Sharks, whales, and dolphins share similar features such as body shape and the position of fins. However, sharks have gills for breathing, while whales and dolphins have lungs. These differences indicate that the organisms share a common ancestor for .Whales also possess a vestigial pelvic bone. The presence of the pelvis bone may indicate that whales . The Department of Education would like to test the hypothesis that the average debt load of graduating students with a Bachelor's degree is equal to $17,000. A random sample of 34 students had an average debt load of $18,200. It is believed that the population standard deviation for student debt load is $4,200. The Department of Education would like to set = 0.05. Which one of the following statements is true?Because the p-value is greater than , we fail to reject the null hypothesis and conclude that the average debt load is equal to $17,000.Because the p-value is less than , we reject the null hypothesis and conclude that the average debt load is equal to $17,000.Because the p-value is less than , we fail to reject the null hypothesis and conclude that the average debt load is not equal to $17,000.Because the p-value is greater than , we fail to reject the null hypothesis and cannot conclude that the average debt load is not equal to $17,000. Homeostatic regulation of the body is made possible through coordination of all body systems. This coordination is achieved mainly by:__________. A focused, real-world look at one's chosen career in order to confirm the decision is a process associated with: A. foreclosure. B. diffusion. C. moratorium. D. reality. Identify the characteristics that have enabled Singapore to become one of the worlds most prosperous nations. Correct Answer(s) rich mineral deposits self-sufficiency in regard to water, food, and energy stable financial system strategic location high literacy rate strong agricultural sector Incorrect Answer(s) An object is pulled northward by a force on 10 N and at the same time another force of 15 N pulls it southward. The magnitude of the resultant force on the object is _____ According to George Thorn, there are three cues that help you to determine the position of a sound. One is the pinna effect. What are the other two cues? please help me I can fail math compare and contrast the indigenous people of Australia and new Zealand. How were they different? How would each be best described Steam Workshop Downloader