what is the full fom of ping
Answers were Sorted based on User's Feedback
Answer / sweta
Stands for Packet InterNet Gopher
Packet Internet Groper (Ping) allows you to quickly verify
the connectivity of your network devices. Ping attempts to
transmit a packet from one device to a station on the
network and listens for the response to ensure that it was
correctly received. You can validate connections on the
parts of your network by pinging different devices:
| Is This Answer Correct ? | 15 Yes | 1 No |
Answer / nadeem
packet internet gopher. it use for find connectivity of
host.
| Is This Answer Correct ? | 10 Yes | 3 No |
Answer / sameer
packet internet gopher . it used to allows you to quickly verify the connectivity for your network device.
| Is This Answer Correct ? | 9 Yes | 3 No |
Answer / amit
packet internet gropher it used for chek the conectivity
of network
| Is This Answer Correct ? | 7 Yes | 1 No |
Answer / murthyrajuch
Full form of PING - PING Stands for Packet InterNet Gopher
Raven.
| Is This Answer Correct ? | 7 Yes | 2 No |
Answer / livia
Packet Inter Net Gopher which is used to test the physical
and logical connectivity between source and destination.
| Is This Answer Correct ? | 4 Yes | 1 No |
If you are running Token Ring with Novell IPX routing, which encapsulation should you use? A.) SAP B.) SNAP C.) 802.5 D.) 802.2
A traffic light is an example of what type of mechanism? A.) Collision detection B.) Flow control C.) Sequence numbering D.) Network management
Which statement about the data link connection identifier (DLCI) is true? A. It is a number that identifies a local virtual circuit in a Frame Relay network B. It is a signaling standard between the CIDE device and the Frame Relay switch C. It is the clock speed (pod speed) of the connection (local loop) to the Frame Relay Cloud D. It is the Maximum number of uncommitted bits that the Frame Relay switch will attempt to transfer beyond the Committed Information Rate (CIP)
What is the icmp protocol?
what is diffrence betwwen mpls and frame really
Which of the follow do not belong to the customer? A.) CO B.) DCE C.) Router D.) CPE E.) Demarc F.) DTE
What is trigger rip and from which ios version it starts?
Select the compression protocols for PPP? A. Stac B. Predictor C. Quality D. Magic Number
what is a malicious router?when it occurs? what is a malicious pacekt ?when it occurs?
Which layer hides details of network dependent information from the higher layers by providing transparent data transfer? A.) Transport B.) Physical C.) Data Link D.) Session E.) Application F.) Network
When we use extended access-list?
Which port are used by Viruses? TCP or UDP?