Answer Posted / b.sanjeev
Few IT managers have the luxury of looking ahead more than
a year or two.
Nicholas Carr, the author of "Does IT Matter?", takes
readers on a trip one decade into the future to see how IT
will change and what those changes mean for IT
professionals, hardware and software vendors, and
corporations of all sizes.
Register now for your free Internet.com membership to
download your complimentary eBook. Membership will also
give you access to:
eBook library Whitepapers Webcasts
Newsletters WinDrivers
A utility to determine whether a specific IP address is
accessible. It works by sending a packet to the specified
address and waiting for a reply. PING is used primarily to
troubleshoot Internet connections. There are many freeware
and shareware Ping utilities available for personal
computers.
It is often believed that "Ping" is an abbreviation for
Packet Internet Groper, but Ping's author has stated that
the names comes from the sound that a sonar makes.
| Is This Answer Correct ? | 7 Yes | 0 No |
Post New Answer View All Answers
What is the last major networking problem you troubleshot and solved on your own in the last year?
How dynamic host configuration protocol aid in network administration?
When you connect two redundant links of switch to hub to form a loop , and when the switch receives its own BPDU what it will do.
how to add additional instances sar r3, what are the steps to take server is down.
How to securing a computer network?
Give one disadvantage of a peer to peer network?
User Datagram Protocol (UDP) is __ and __ a. connectionless, stateless b. connection-orineted, stateless c. connection-oriented, stateful d. connectionless, stateful
Explain 802.1Q header?.
Difference b/w SCSI AND IDE
Explain how to identify the ip class of a given ip address?
if one server is down, whenever restart the machine we get ok prompt what is the problem?
Explain the maximum length allowed for a utp cable?
How do two computers communicate with each other when they are connected through L2 or L3 switch?
Is there any website? Which can theft or watch any system or computer hardware drives(memory)while they are accessing Internet.If it is avilable what is it? Please answer me.Advance thanks
senario: There are two switches connected via trunk port.One end station is connected to each switch via access port. All the ports are in same VLAN.All the ports have same speed 1Gbps.Start sending 1Gbps traffic from one end station to other. Determine percentage of traffic received by destination end station.