Which of the following protocols is used in a ping command?
A. IGMP
B. ICMP
C. SMTP
D. TFTP
Answer: B. ICMP
You might also like to view...
Data stored in a file is considered:
a) temporary data b) persistent data c) recurring data d) there is no need to store data in files
Write a method called powersOfTwo that prints the first 10 powers of 2 (starting with 2). The method takes no parameters and doesn't return anything.
``` public void powersOfTwo() { int base = 2; for (int power = 1; power <= 10; power++) System.out.println(Math.pow(base,power)); } ```
Rewrite the home program from Exercise 5 in Chapter 6 to use IFS to extract the home directory from /etc/passwd. What happens to the program if one of the fields in the file is null, as in
steve:*:203:100::/users/steve:/bin/ksh Here the fifth field is null (::).
Social media can deliver a large number of highly targeted potential customers at a relatively low ________
Fill in the blank(s) with correct word