Which of the following protocols is used in a ping command?

A. IGMP
B. ICMP
C. SMTP
D. TFTP


Answer: B. ICMP

Computer Science & Information Technology

You might also like to view...

Data stored in a file is considered:

a) temporary data b) persistent data c) recurring data d) there is no need to store data in files

Computer Science & Information Technology

Write a method called powersOfTwo that prints the first 10 powers of 2 (starting with 2). The method takes no parameters and doesn't return anything.

``` public void powersOfTwo() { int base = 2; for (int power = 1; power <= 10; power++) System.out.println(Math.pow(base,power)); } ```

Computer Science & Information Technology

Rewrite the home program from Exercise 5 in Chapter 6 to use IFS to extract the home directory from /etc/passwd. What happens to the program if one of the fields in the file is null, as in

steve:*:203:100::/users/steve:/bin/ksh Here the fifth field is null (::).

Computer Science & Information Technology

Social media can deliver a large number of highly targeted potential customers at a relatively low ________

Fill in the blank(s) with correct word

Computer Science & Information Technology