What two types of icmp messages are received at the sending host executing the traceroute program?

Answers

Answer 1

Port unreachable and TTL (Time to Live) Expired messages are received at the sending host.

In cases when a packet reaches an end-host destined for a UDP port for which no host is associated, it generates an ICMP port unreachable in response. Also, an ICMP Port unreachable message can be generated in instances where the router could not find the server.

TTL expired on the other hand is used upon the execution of traceroute command. An ICMP message is sent out with a TTL value of 1 set in the IP header. The end host receiving a traceroute probe would send a TTL Expired ICMP when a single probe finally reaches it.






Answer 2

Final answer:

The "Time Exceeded" and "Destination Unreachable" messages are two types of ICMP messages received by a host running traceroute when a packet's TTL expires or the packet cannot be delivered.

Explanation:

The two types of ICMP messages received at the sending host executing the traceroute program are "Time Exceeded" messages and "Destination Unreachable" messages. The "Time Exceeded" message is received when a packet's time-to-live (TTL) value has reached zero before reaching its destination, prompting the intermediary router to send this message back to the source. The "Destination Unreachable" message is sent back if, for some reason, the packet could not be delivered to the destination host or if a communication port is not available.


Related Questions

Which is an example of a Foley effect?
recording the sound of an aircraft taking off onboard a naval warship


wailing into the microphone to voice a character in distress


blowing air into a paper bag and popping it to reproduce the sound of a tire burst


combining two voices on a computer using software to create a vocal effect

Answers

Foley effect is the remaking of everyday sounds that are used in movies and tv, so it would be "Blowing air into a paper bag and popping it to reproduce the sound of a tire burst"? I would imagine that is the right one

blowing air into a paper bag and popping it to reproduce the sound of a tire burst

Kenneth's manager has been receiving complaints that Kenneth is rude when he's conversing over email. Which email etiquette has Kenneth violated?
A He sent big files as attachments.
B He hasn't specified the intent of the email in the subject field.
C He hasn't been direct while writing his email.
D He didn't check for grammatical and spelling errors.
E He didn't use the proper tone in the emails he writes.

Answers

I would say (E), He didn't use the proper tone in the emails he writes.

(Ex: Writing in all CAPS, most likely tells the receiver of the EMAIL that you're ANGRY>.).



Hope that helps!!!

The correct answer is E. He didn't use the proper tone in the emails he writes.

Explanation:

Etiquette in email communication and similar contexts includes a set of rules that guarantee communication is effective and polite. In the case of proper tone, this refers to the attitude the person writing the message conveys, this can be polite, unpolite, honest, rude, etc. Additionally, the tone depends on the words used as well as other elements, for example not including a salutation might be interpreted as rude for many people.

According to this, Kenneth has probably violated the rule of using a proper tone because people complaints he seems rude in his email messages. This means, he probably did not use the appropriate words or elements and convey a negative attitude or tone.

do someone know some good movie?

Answers

DESCENDANTS 1&2




Hopefully I helped

What type of movies?

Which describes the conditions that must be met in order to use Subtotal in a spreadsheet? The data must be in adjacent cells and organized in rows using headings. The data must be in adjacent cells and organized in columns using headings. The data must be distributed in different spreadsheets using the same range of cells. The data must be distributed in different tabs within the same spreadsheet using the same range of cells.

Answers

The answer is (B): The data must be in adjacent cells and organized in columns using headings.

You can always add subtotals that contain the same function to several columns at the same time. In most cases, subtotals evaluate values based on categories in another column. For instance, when the value in column A changes, the corresponding value in column B is evaluated.

Answer:

B

Explanation:

Julian is adding a column of numbers as he inputs expenses from his receipts. Holly wants to create a simple comparison between two grocery stores. Which type of tab alignments would most likely suit each person?

Answers

The best answer to this is:
Julian would use a Decimal tab, and Holly would use a Bar tab.

In jpeg files, what's the starting offset position for the jfif label?

Answers

The answer is Offset 6.  JFIF stands for JPEG File Interchange Format. For the JPEG file, the Offset 6 is used for the starting position of JFIF label.  The hexadecimal value is FFD8.  

A teacher has bookmarked a large number of webpages in Chrome while researching class topics. Unfortunately, he's bookmarked so many that he's struggling to find relevant content quickly. What can he do to simplify this? (Select 3 answers.)

Create a Doc that lists all favorite websites with links
Delete bookmarks that are not urgently required and search for them again when they are needed
Use the search function in the Chrome Bookmark Manager
Rename bookmarks so they are labeled clearly
Organize bookmarks into themed folders

Answers

Rename bookmarks so they are labeled clearly

Why does adding the printer to your computer require a password mta?

Answers

it depends on the security preferences on your computer, if yes try setting new security options

: how do network effects help facebook fend off smaller social-networking rivals?

Answers

How do network effects help Facebook fend off smaller social-networking rivals? The way a network effect works it that one user of a good or service determine the value of the product to other people. Depending on how many people use the product or service, allows the network to see the value they believe it holds. Because Facebook has billions of users, they have a high value and strong network. 

Dr. Sperry, a biologist, is using Excel to track growth rates of different populations of bacteria. She has a very complex formula in one cell. It begins with “ROUND”. Dr. Sperry would like to see exactly how Excel’s calculation reached the final rounded value that she sees in the cell.

Answers

by using the evaluate formula dialog box

Addictions may ______ friends and family
A)Bring together
B) please
C) alienate
D) help

Answers

C because alienation with addictions may block out friends and family.

Addictions may alienate friends and family, Therefore the Alienate words have completed the sentence.

What is family?

A family is a group of individuals connected through consanguinity (by known birth) or affinity. The maintenance of the welfare of its members and of society is the goal of the family. Having a family implies that you have someone who will love you no matter what. A family is a group of people who love and support one another despite difficulties.

The term addiction refers to that, treatable, Chronic medical disease involving complex interactions among brain circuits, genetics, the environment, and an individual's life experiences. People with addiction use substances or engage in behaviors that become compulsive and often continue despite harmful consequences.

Therefore, Thus option (C) is correct.

Learn more about family here:

https://brainly.com/question/10205802

#SPJ5

These items describe guidelines for the effective use of presentation graphics. Graphics should be large enough to be seen by the audience. Graphics should be used on every slide. Graphics should be used to make a boring presentation interesting. Graphics should be used when they are relevant to the content.

Answers

Answer:

All but graphics should be used on every slide

Explanation:

When you use a menu bar, it is at the top of the screen in most gui programs, and the first menu item is almost always ____?

Answers

It is usually file? Hope I could help.

Answer:

File

Explanation:

Whe you use a menu bar, that is the menu that is located at teh top of the window of teh program in most of the computer systems that exist nowadays, for example, In mac you have them at the top of your program window, and the most common first item in the Menu is the tab "File" in Windows or Pc is also "File" so the item File would be the best answer to this question.

Why is ssh preferred over telnet for remote connections?

Answers

telnet conversations are not encrypted, whereas ssh conversations are, so ssh is secured against eavesdropping.

the header, in an academic report, typically contains the author’s name and the current page number true or false

Answers

TRUE

True


In most academic reports, most specifically, an MLA academic report, Student’s last name and current page number is contained in the headers. In MLA, which is most common used formatting guide in academic reports, headers numbers all pages consecutively within the right margin.


Twitter and facebook are both examples of the​ _____________ internet business model.

Answers

community provider  

Provide online meeting place where people with similar interest can communicate and find useful information

People can transact, share interests, photos and videos

the only way to print a photo is on a special glossy paper using professional printing services in a store

True
OR
False

Answers

i believe this is true


i think  this is true

What do you feel are the limitations of a computer that has no operating system? how would a user load and execute a program?

Answers

Final answer:

A computer without an operating system has significant limitations in user interaction and program execution, requiring manual and intricate knowledge of hardware for any operation.

Explanation:

A computer without an operating system (OS) faces significant limitations. The OS acts as a mediator between the user and the computer's hardware, managing software resources and simplifying application programming. Without an operating system, a user would have to manually control the hardware, which is exceptionally complex and impractical for general users.

Without an OS, loading and executing a program would involve writing code directly to the hardware, typically using machine language or assembly language. This process is both error-prone and time-consuming, only feasible for advanced users with a deep understanding of computer architecture. For the average user, a computer without an OS would be nearly unusable for regular tasks.

When one says that e-commerce takes away the physical boundaries in doing business, it’s mostly referring to the actual business transaction – the buying and selling, not to the delivery of what was purchased if that is a physical product

Answers

Do you have answer choices?

Answer: is A true

Explanation:

Just got done doing the assignment.

Which part of the os provides users and applications with an interface to manipulate files?

Answers

I would think you're looking at the GUI, or, Graphical User Interface.

If it's manipulating files only, maybe your looking for the answer of the Filesystem.

I hope this doesn you some good.

Which feature of a typical professional networking site helps users add professional details to their profile?


Volunteer Experiences and Causes


Skills and Expertise


Sharing Bookmarklet


Status Update

Answers

That's a good question I think it's LinkedIn where they have professional profiles

“When using a public computer for browsing the Internet, try to use for________ transactions. Also, use__________ browsing whenever you can.”

FILL IN THE BLANK

Answers

Final answer:

Use non-sensitive transactions on public computers and engage in private browsing. Disconnect from the internet before opening downloaded documents. For security, use a personal device with Chrome.

Explanation:

When using a public computer for browsing the Internet, try to use non-sensitive transactions. Also, use private or incognito browsing whenever you can. It's important to be cautious about entering identifying information into a website, such as your address, and be wary of downloading documents that could access the internet, like photos, Word documents, or PDFs. If necessary, disconnect from the internet before opening such a document. Remember that the most basic version of encrypted communications is in-transit encryption, which protects the content of your communications when browsing the web. For essential online activities, it is recommended that users complete these using a desktop or laptop computer and in Chrome for better security and performance.

what is NOT powered by the PSU of your computer?

Answers

Peripherals like your monitor or your printer.

The PSU does not directly power peripheral devices like the keyboard or mouse, which are powered via USB ports.

The PSU (Power Supply Unit) of a computer is responsible for powering most of the internal components. This includes the motherboard, CPU (Central Processing Unit), RAM (Random Access Memory), GPU (Graphics Processing Unit), hard drives, and SSDs (Solid-State Drives). However, one component that is not powered directly by the PSU is the peripheral devices, such as a keyboard or mouse. These devices instead receive power through the computer's USB ports.

Components Not Powered by the PSU

Keyboard Mouse  

These examples illustrate how the PSU functions primarily to power core internals of the computer, leaving the task of powering peripherals to other means.

The smallest building block of a wireless lan is a ______.

Answers

Wireless LAN, or also denoted as WLAN is a Local Area Network that uses wireless communication. The standard for WLAN is given in IEEE 802.11 
The smallest building block of a Wireless LAN is a basic service set (BSS). This set consists of wireless stations which are executing the same MAC protocol and competing for access to the same shared wireless system.

Blender questions
14. A mesh represents a(n) _____ object if its faces enclose a positive and finite amount of space. (1 point)

odd

connected

simple

convex



15. Which of the following is the 3-D view port? (1 point)

the standard layout used for new files

the polygon viewing on the default screen

straight line segments connecting two vertices

a single static image in 3-D

Answers

Answer:

1. Public project

2. true

3. True

4. Simple

5. The info header

6. How to navigate in the space and how to interact with objects

7. Mesh

8. Toolboxes

9. True

10. Keyboard Shortcut

11.Num Lock

12. False

13.False

14. the polygon viewing on the default screen

15. The standard layout used for new files

WARNING

This was the correct answers for 3-D Computer Modeling A Unit 5 Quiz on Connections Academy

Not sure if answers and questions differ for people this was just my quiz answers

Hope it helps y’all

If a submarine's viewing port has a surface area of 0.0100 m2, the force exerted by the water on it at this depth will be 416,000 N in magnitude.

What is submarine's viewing port?

If a submarine's viewing port has a surface area of 0.0100 m2, the force exerted by the water on it at this depth will be 416,000 N in magnitude. The two fluid pressures that are in play are the internal atmospheric air pressure and the external water pressure, which includes the atmosphere operating on it at the surface.

The net force due to fluid pressure can be calculated by using the gauge pressure of the water since the atmospheric pressure acts both internally and is also included in the water pressure and the air pressures virtually cancel each other out.

A force is a vector quantity since it has b0th magnitude and direction. It is calculated using newtons as the SI unit of mea.sure (N). F stands for force (formerly P).

Therefore, If a submarine's viewing port has a surface area of 0.0100 m2, the force exerted by the water on it at this depth will be 416,000 N in magnitude.

Learn more about force here:

brainly.com/question/14110395

#SPJ3

Urgent help
Write a program that prints ‘Hello World’ to the screen

Answers

class newprog
 { 
      public static void main()
       {

                 System.out.println("Hello world");
              }
}

[tex]\huge{\purple{\underline{\underline{\mathfrak{\red{\bigstar Java:: \bigstar}}}}}}[/tex]

public class Main {

public static void main(String [] args) {

System.out.println("Hello World");

}

}

[tex]\gray{\rule{300pt}{0.4em}}[/tex]

[tex]\huge{\purple{\underline{\underline{\mathfrak{\red{\bigstar Python:: \bigstar}}}}}}[/tex]

print('Hello World')

[tex]\gray{\rule{300pt}{0.4em}}[/tex]

[tex]\huge{\purple{\underline{\underline{\mathfrak{\red{\bigstar C++:: \bigstar}}}}}}[/tex]

#include <iostream>

using namespace std;

int main() {

cout << "Hello World";

return 0;

}

[tex]\gray{\rule{300pt}{0.4em}}[/tex]

Hope it helps..

____ idss/ipss monitor activity on network segments. essentially, they sniff traffic as it flows over the network and alert a security administrator when something suspicious occurs.

Answers

IDS stands for Intrusion detection systems. These systems help detect attacks on systems and networks. IPS stands for Intrusion prevention systems (IPSs)  and stop attacks in progress.
Network based IDSs/IPSs monitor activity on network segments. essentially, they sniff traffic as it flows over the network and alert a security administrator when something suspicious occurs.

if BAD = 10, DAC = 11 and CGI = 22 what is the value of OCCAM?

Answers

The answer is 40.  Given that A = 1, B = 2, C = 3, D=4, E=5, F=6 and so on.... 
BAD = 10 :     2 + 1 + 4 + (3) 
DAC = 11 :     4 + 1 + 3 + (3) 
CGI = 22 :      3 + 7 + 9 + (3) 
The term (3) that is necessary could be the number of letters in the equation. 
Therefore, 
OCCAM = 15 + 3 + 3 + 1 +13 + (5) = 40 (5, using number of letters) 

11. If you are seeking original research, current and developing trends, and experts within a specific field you should consult
A. television and video recordings.
B. subject-specific encyclopedia.
C. encyclopedia such as World Book Encyclopedia, Encyclopedia.com or Encyclopaedia Britannica.
D. periodical/trade journals.

Answers

I'd say (D) Periodical/trade journals.

In layman’s, periodical is any publication that comes out occasionally, i.e. periodically and is used at a regular. These journals are often the best sources for research especially if your research requires recent information, information on a specific topic, or information on local news. Periodicals that are peer or scholarly reviewed all have articles reviewed by experts in the subject.

What is the name of the redesign heuristic that suggests checking the completeness and correctness of incoming materials?

Answers

The answer is Control Addition.  The Control Addition is the name of the redesign heuristic that suggests checking the completeness and correctness of incoming materials.  

The heuristic is called the **"Ingestion Heuristic,"** focusing on verifying completeness and correctness of incoming materials before processing.

The heuristic you're referring to is known as the **"Ingestion Heuristic."** This concept is particularly relevant in redesigning systems or processes where materials, data, or information are received or ingested from external sources.

The main focus of the ingestion heuristic is to ensure that the incoming materials are complete and correct before they are processed further or utilized within the system.

In practical terms, applying the ingestion heuristic involves establishing clear criteria or checks to verify the completeness and correctness of incoming materials. This may include checking for missing data, validating the format or structure, ensuring data integrity, and verifying the accuracy of content.

By implementing robust ingestion processes guided by this heuristic, organizations can minimize errors, reduce processing delays, and enhance overall reliability and quality of operations.

Overall, the ingestion heuristic underscores the importance of proactive validation and quality assurance at the point of material intake, thereby promoting efficiency and reliability throughout the system's workflow.

Other Questions
How can you prove a triangle is a right triangle? select one:a. use the distance formula to see if at least two sides are congruent.b. use the slope formula to see if any sides are perpendicular.c. use the distance formula to see if all three sides are congruent.d. use the slope formula to see if any sides are parallel? The presence of bright red blood in the stool is known as _____.a. steatorrheab. melenac. hematemesisd. hematochezia Read the selection below from Gullivers Travels by Jonathan Swift and answer the question that follows.The reader may remember, that when I signed those articles upon which I recovered my liberty, there were some which I disliked, upon account of their being too servile; neither could anything but an extreme necessity have forced me to submit. But being now a nardac of the highest rank in that empire, such offices were looked upon as below my dignity, and the emperor (to do him justice), never once mentioned them to me. However, it was not long before I had an opportunity of doing his majesty, at least as I then thought, a most signal service. The signal service mentioned in the passage above was not welcomed by the empress of Lilliput. Why?She wishes that Gulliver would spend less time with the emperor of Lilliput.She organizes a celebration that Gulliver attends even though he is not invited.She does not appreciate Gulliver urinating on her palace to douse the flames.She does not want Gulliver to be an ambassador for Lilliput to Blefuscu. katy buys x cakes.Gugu buys 3 times as many cakes as katy.Deanna buys 2 more cakes than Katy.Each cake costs 85pThe total of the cakes is 52.70How many cakes did each girl buy? Each of the following supported the development of land trade in ancient Rome except surrounding hills and mountains a network of local rivers fertile plains in the north and west its position on a peninsula A train travels 97 kilometers in 2 hours, and then 96 kilometers in 2 hours. What is its average speed? In the reaction 2co(g) + o2(g) 2co2(g), what is the ratio of moles of oxygen used to moles of co2 produced? select one: Algebra question ( Matrices and Determinants ) 20 points How does the volume of an oblique cylinder change if the radius is reduced to 2/9 of its original size and the height is quadrupled? A. V=2/81pir^2h B. V=16/81pir^2h C. V=4/9pir^2h D. V=16/9pir^2h I WILL GIVE BRAINLIEST The area of the surface of the trampoline (square) is equal to twice its perimeter. Find the dimensions. length= 4x ft., width= (x+6) ft.FACTORING POLYNOMIALS/SOLVE THE EQUATION BY FACTORING HOMEWORK lou has 1/2 of a circular pizza left over from a party. he takes a third if it as a snack and evenly splits up the rest to share with his three brothers. Assuming that Lou cuts slices from the center of the straight edge, what are the angles of the slices of pizza. Select two that apply. If the endpoints of the diameter of a circle are (10, 8) and (6, 2), what is the standard form equation of the circle? A)(x 8)2 + (y 5)2 = 13 B)(x + 8)2 + (y + 5)2 = 13 C)(x 8)2 + (y 5)2 = 13 D)(x + 8)2 + (y + 5)2 = 13 HELP PLZ ASAP!!!!!!!!!!!THX to avoid a large shallow reef a ship set a course from point a and traveled 24 miles east to point b . the ship them turn and traveled 33 miles south to point c. if the ship could have traveled in a straight lime from point a to point c about how many miles could it have saved the volume of a cylinder is 1,692.46 in cubed. if the radius becomes three times as large, what will be the cylinder's volume? DEFrotates 90 clockwise about point A to create D'E'F. Therefore, which equation must be true? mDEF = mD'F'E' It took months for u.s. troops to capture a small band of apaches led by: In a certain country, a letter up to 1 ounce requires postage in the amount of $0.42, and each additional ounce (or fraction of an ounce) has an additional cost. The function below represents the cost of mailing one letter in this country. f(c)=0.42 + 0.20[x-1] Josiah has two letters. The first weighs 2.9 ounces, and the second weighs 4.1 ounces. What is the total amount Josiah can expect to pay for postage? $1.62 $1.64 $1.84 $2.04 Which phrase describes an al atom?a.a negatively charged nucleus, surrounded by negatively charged electronsb.a negatively charged nucleus, surrounded by positively charged electrons? 30kx-6kx=8 solve for x