Icmp (internet control message protocol) is a _______ layer core protocol that reports on the success or failure of data delivery.​

Answers

Answer 1
Icmp (internet control message protocol ) is a Network layer core protocol that reports on the success or failure of data delivery.

Related Questions

What protocol is responsible for assigning ip addresses to hosts on most networks?

Answers

Are you in K22 online program

A user has been complaining that their wireless connection has been connecting and disconnecting too frequently. what command could you use to generate a detailed html-based report for analysis of the wireless connection on their computer in the past?

Answers

A user has been complaining that their wireless connection has been connecting and disconnecting too frequently. You could use the command netsh wlan show wlanreport  to generate a detailed HTML based report for analysis of the wireless connection on their computer in the past.

The netsh tool, is used to generate an interactive WLAN Report.


_____ occurs when the computer performs the requested mathematical/logical input operation.

Answers

ALU or Arithmetic Logic unit I believe. Tell me if im right please

Arithmetic Logic unit occurs when the computer performs the requested mathematical or logical input operation.

What is a CPU?

CPU is an abbreviation which is central processing unit and it can be defined as the main components of a computer because it acts as the “brain” of a computer and does all the processing, arithmetic calculations, and logical computation (control).

A control unit (CU) can be defined as a component of a computer's central processing unit (CPU) that is designed and developed to direct the operation of the processor such as processing, arithmetic calculations, and logical computation (control).

In this context, we can reasonably infer and logically deduce that a control unit (CU) typically consists of a central processing unit (CPU) with an arithmetic logic unit (ALU) and then registers.

Therefore, Arithmetic Logic unit occurs when the computer performs the requested mathematical or logical input operation.

Learn more about Arithmetic Logic unit on:

https://brainly.com/question/14247175

#SPJ2

Which of the following are unsponsored Internet domain extensions? .museum .gov .edu none of the above

Answers

none of the above since they are all owned by government

Answer:

none aof the above

Explanation:

The ____ data type can store up to a gigabyte of text.

Answers

The long text type of data is able to store more gigabyte text.

For local travel addresses and street names should be

Answers

Capitalized  and properly spelled 

When you print ____, the presentation is printed with one or more slides on each piece of paper?

Answers

When you print handouts, the presentation is printed with one or more slides on each piece of paper. When you print handouts, it's best to have the presentation printed on them for those who can not view the presentation clearly to follow along with. This also serves as a great tool for people who missed the presentation to receive a handout later or for those there to take home and review. 

In a call stack frame, the system places the values of the arguments and the return address for the particular ____.

Answers

In a stack frame, the system places the values of the arguments and the return address for the particular Function Call. A stack frame is defined as a data frame that gets pushed in the stack. In terms of a call stack, a function call and its argument data represent a stack frame .

In a call stack frame, the system places the values of the arguments and the return address for the particular function that is being called.

When a function is called within a program, a call stack frame, also known as an activation record, is created. This frame includes various pieces of information that are essential for the function's execution and eventual return to the calling point in the program. First, it contains the function arguments, which are the values passed to the function by the caller. These arguments are used by the function to perform its tasks. Additionally, the stack frame includes the return address, which tells the program where to resume execution once the function has finished running. This return address is typically the instruction that immediately follows the function call in the calling function. Local variables created within the function are also stored in the stack frame, and they only exist for the duration of the function's execution. The stack frame is important to ensure that each function call has its own separate space for variables and that upon completion, the program can continue to operate correctly from where it left off.

What term describes a wireless network topology in which access points work as peer devices on the same network?

Answers

Mesh WLAN wireless mesh network WMN describes a wireless network topology in  access points work as peer devices on the same network.

When you first log into linux, what is the current working directory?

Answers

This will depend on what the user has set the default working directory to. In order to check for yourself what your default working directory is inside linux, simply log in, click the start button>Click System Tools>LXTerminal. Once in the terminal, you can check your current working directory by typing in "pwd" without the quotation marks. Then, hit enter on your keyboard and the terminal will print your current working directory. I hope this has helped you.

A(n) ____ stores a query and is used to access data in the underlying tables.

Answers

A cross tab query is good in data assessment
 in any underlying tables.

What feature was created for users who prefer to use the keyboard rather than the mouse, and provides keyboard code icons that may be used in conjunction with the alt key?

Answers

The feature that was created for users who prefer to use the keyboard rather than the mouse, and provides keyboard code icons that may be used in conjunction with the 'Alt' key, is known as Alt codes or Alt key combinations.

Alt codes are a series of keys one can press on a computer keyboard to produce special characters not found on the keyboard. They allow users to generate symbols, foreign letters, and other characters by pressing the 'Alt' key followed by a numerical code on the numpad. This method of typing is especially useful for those who work with various character sets or prefer not to rely on a mouse for input. To use an Alt code, you would hold down the 'Alt' key and enter the numeric code for the symbol you want. For example, the Alt code for the copyright symbol (©) is 'Alt + 0169'. These combinations provide a quick way to access a wide range of special characters and are widely utilized across different software and platforms that support them.

When you choose the ____ compression setting, photos are compressed to the resolution specified on the advanced tab in the powerpoint options dialog box?

Answers

When you choose the document resolution compression setting, photos are compressed to the resolution specified on the advanced tab in the PowerPoint options dialog box.  By compressing your photos in to a PowerPoint it allows for the photos to shrink proportionally to look correct in a smaller or larger screen. They will adjust the photo automatically to fit inside the dialog box. 

I use iSlide PowerPoint add-in. It has built-in Picture Library. The pictures can proportionally zoom in and out to fit the size of the dialog box.

John would like to move from the suburbs into the city, but the rent in the city is very high. John has found an apartment he really likes, but he can only afford about 60% of the monthly rent. What is the best housing option for John?

Answers

A list of multiple choices is given;

a)      Purchase a home in the city center instead.

b)      Rent the apartment anyway.

c)       Rent the apartment with a roommate.

d)      Purchase a home in the suburbs instead.


The answer is (C)


John should look for an apartment and share it with a roommate. This will bring down rent expenses to 50% as both John and the roommate will be cost sharing the rent. If the rent expenses go down by 50%, he’ll be able to save an additional 10% and use it for other expenses.

What is the purpose of the overload keyword in the ip nat inside source list 1 pool nat_pool overload command?

Answers

Final answer:

The 'overload' keyword in the 'ip nat inside source list 1 pool nat_pool overload' command allows multiple private IP addresses to be translated to a single public IP address simultaneously through Port Address Translation (PAT).

Explanation:

The overload keyword in the ip nat inside source list 1 pool nat_pool overload command is used to allow multiple private IP addresses to be translated to a single public IP address simultaneously.

This is achieved by using a technique called Port Address Translation (PAT) or Network Address and Port Translation (NAPT). With PAT, different private IP addresses are mapped to different port numbers of a single public IP address, allowing for more efficient use of limited public IP addresses.

What was the impact of the rise of the Japanese auto industry and the semiconductor industry in south eastern​ Asia? A. It increased communication B. It made the business planning process in the country easier C. It greatly expanded international trade D. It increased the human resource in the market E. It increased international IS operations

Answers

The Japanese auto industry and the semiconductor industry expanded greatly the international trade.

A built-in ____ in your personal computer can make it simpler to transfer photos from a solid state memory card used in your digital camera.

Answers

A built-in File Manager is the answer

Answer:

a

Explanation:

What is one benefit of using object-oriented programming?

Answers

Final answer:

Object-oriented programming enhances modularity and code reuse, making it easier to add new objects without altering existing code, leading to better scalability and maintenance.

Explanation:

One benefit of using object-oriented programming (OOP) is that it allows developers to create modules that do not need to be changed when a new type of object is added. Developers can simply create a new object that inherits many of its features from existing objects.

This makes OOP very modular, with the ability to reuse code components and scale systems more effectively compared to procedural programming paradigms. Object-oriented design principles such as encapsulation and abstraction also contribute to improved code maintenance and flexibility, allowing for the development of more robust and error-tolerant software.

You are setting up a small network that will not connect to the internet. you want computers to be able to locate each other by using hostnames. what service will do this?

Answers

COX WIFI                


Hope this helps :D

we see color because an object that has light striking it

Answers

We see color because an object that has light striking it reflects the color we see.  The object has certain chemicals in it that when illuminated,  absorbs the color we see, reflects the color we see, refracts all colors but the one we see.

Which ribbon is visible when a pivottable is selected, and allows a user to apply various styles to the pivottable?

Answers

Design is a visible ribbon when a pivottable is selected and allows a user to apply various style to the pivottable.

What is the process called that grants or denies a user's access to network resources?

Answers

Administration«««that's the answer

Which of the following is a characteristic of Data Visualization?

a ) Converts Information
b ) Involves Visuals
c ) Simplifies Understanding
d ) all of the answers are correct

Explain your answer if you can :)

Answers

D is most likely the answer, I really don't know how to explain it.

The data visualization is a character of the data or the information and makes use of visual elements like the chart, graph, and others to show. Hence option D is correct.

What is data visualization?

Data visualization refers to the representation of information and data. It includes various elements like the chart, graph, and tool that allow us to access the visual materials. They are efficient ay to communicating and saving time.

Find out more information about the data visualization.

brainly.com/question/19566670

Defensive programming is sometimes referred to as _________.

Answers

Anti-malware and Anti-Virus

An item that appears in a program's graphical user interface is known as a _______.

Answers

Widget is an item that appears in a programs graphical user interface.

A _________ is the broadcast of various types of media over the web.

Answers

News Report.
I hope this helps! :)

In what ways has the internet changed direct-response retailing

Answers

The internet has not fundamentally changed direct response marketing but it has transformed how it is conducted. Before the internet, the customer used to call after seeing the infomercial. Today, the customers are exposed to digital marketing which include banner ads and popups which they can click while browsing. 

Which device on a network performs network address translation?

Answers

Network Address Translation (NAT) is the answer

________ is the use of electromagnetic energy to transmit information between a reader (transceiver) and a processing device.

Answers

The answer is Radio-Frequency IdentificationThe use of electromagnetic energy to transmit information between a reader (transceiver) and a processing device is Radio-Frequency Identification (RFID) It is an   electronic devices that consist of a small chip and an antenna. The RFID  device serves the same purpose as a bar code or a magnetic strip on the back of a credit card or ATM card; it provides a unique identifier for that object.

The __________ is the encryption algorithm run in reverse.

Answers

decryption algorithm
Other Questions
I WILL MARK BRAINLIEST TO A CORRECT AND EXPLAINED ANSWER!!!!Look at points C and D on the graph:What is the distance (in units) between points C and D? Round your answer to the nearest hundredth. A. 4.54 units B. 5.00 units C. 5.83 units D. 34.00 units The defining characteristics of a public policy are that it must affect many people, be accepted as legitimate, and: What can you do to your essay to ensure that you are avoiding unintentional plagiarism? How have the actions of the Soviet Union and the United States impacted the Genocide Convention and International Criminal Court? The children assembled first, of course. School was recently over for the summer, and the feeling of liberty sat uneasily on most of them. In one sentence of at least 20 words, explain Shirley Jacksons use of personification in the above passage. Use textual evidence to identify the phrase or phrases that are personification, and discuss how the subtle nuances of her word choices affect the reader. using his telescope, Tommy watches a bald eagle as it sits on the top of a cliff. the telescope is positioned so that the line of sight to the eagle forms a 38 degree angle of elevation. the telescope sits 1.3 m above the ground and the base of the telescope is 116 m away from the base of the cliff. to the nearest tenth of a meter, how high above the ground is the eagle? One of the tallest living trees today is the Mendocino Tree found at Montgomery Woods State Park, California. Its height is about 11,200 centimeters. What is this height in scientific notation?A.0.112*10'-4cmB.1.12*10'4cmC.11.2*10'4cmD.1.12*10'-4cmplz help me i need help i will make brainiest Following Pearl Harbor, what did the the U.S. government do after it declared war on Japan and Germany?A. repealed the Neutrality Act of 1939B. transformed peacetime industries into war industriesC. withdrew economic support from Britain because it was no longer neededD. enacted a draft because few Americans wanted to fight in the war Why must cholesterol, although lipid-soluble, cross most membranes by means of receptor-mediated endocytosis or transporters? propose a mechanism for co-transport of cholesterol through a plasma membrane? In a nuclear power plant, _____.energy is released from the nuclei of atomsenergy is released from the bonds of moleculesenergy is released from the electrons of atomsenergy is stored in the nucleus of atoms Flexor and extensor muscles work _______ to operate the joint. What is the electron configuration of a chlorine ion in a compound of BeCl2?A. [2.8.7]- B. [2.8.8]- C. [2.8.8]+ D. 2.8.7 Bakery a sells bread for $2 per loaf that costs $0.50 per loaf to make. bakery a gives a 70% discount for its bread at the end of the day. what is the salvage value of its bread? A group of 12 people attend a meeting. Every pair of people shook hands with each other. How many handshakes were there? BEACH CLOSED DO TO SHARK SIGHTING - IXL QUESTIONS PLZ HELP correct one error Bob can type 2 letters in 4 hours while Bill can do it in 6. How many hours would it take them, working together, to type six letters? How can you determine if your cardiovascular system is becoming more fit? What event is most likely to occur in a comedy ? what role does the judicial branch play in making public policy?A. proposing a new foreign policy to congress B. determining the scope of a new health care law C. writing a new tax code to reflect changes in marriage laws D. adopting new curriculum standards for a local school district. The number of acres of wetland infested by an invasive plant species after t Years is given by u(t)=122^t/3. Solve the equation u(t)=50. What does your answer tell you about the wetland?