answersLogoWhite

0

i use skull bash, 10 second CD talented and also acts as a charge but you can also use bash, 5 second stun, 1 minute CD is pretty good when used well.

of course, im assuming you're feral because you did not state that in your question...

User Avatar

Wiki User

13y ago

What else can I help you with?

Continue Learning about Communications

How many keys are required for two people to communication via a cipher?

That depends on whether you use a symmetric (shared key) or asymmetric (public/private key pair) algorithm. If you use a symmetric key, it means both people have the same key which has been pre-shared via some secure means. In that case, only one key is required; both parties in the communication use the same key to encrypt and decrypt all messages. If you use an asymmetric key algorithm, it takes at least 4 keys total: when sending a message each user will encrypt their message with the public key of the recipient (that accounts for two of the keys). Each recipient must then use their private key to decrypt the messages they receive (which accounts for the other two required keys).


How do you ping192.168.1.100 to 192.168.2.100?

To ping 192.168.2.100 from a device with the IP address 192.168.1.100, you need to ensure that both devices are on the same network or that routing is configured between the two networks. Use the command prompt or terminal on the device with the IP 192.168.1.100 and type ping 192.168.2.100 and press Enter. If there's proper connectivity and routing, you should receive replies; otherwise, you may see request timeouts.


What is the difference between ping and telnet?

Pinging a server just checks that Particular system is present on the network. Telnet or SSH are application to login the server from remote and use the services provided by the server. In TELNET DATA is not encrypted so it's easy to hack. In SSH DATA is encrypted so it's safe.


Why use memo?

why use memo?


When do you use formal communication?

When would you use formal communication

Related Questions

In addition to the ping command what other windows command is useful in displaying network delay and breaks in the path to the destination?

Traceroute. Use: tracert <ip-address> or tracert <URL>


How would you troubleshoot the problem if you suspect that a router's LAN gateway is down?

You can use either or both ping/tracert.


What command prompt would help you narrow a failing connection?

If you mean a Command Prompt Command then there are a few you can use. The most commonly used would be ping and tracert. But there are others including netstat which shows the port status.


15 How do you know the path that a packet takes to the destination?

You use the traceroute command. Example, in Windows: open a command window, and type tracert wiki.answers.com.You use the traceroute command. Example, in Windows: open a command window, and type tracert wiki.answers.com.You use the traceroute command. Example, in Windows: open a command window, and type tracert wiki.answers.com.You use the traceroute command. Example, in Windows: open a command window, and type tracert wiki.answers.com.


When do you think that you would use a tool like pathping or tracert?

network


What utilities would you typically use to determine the number of hops to a specific destination?

You use the traceroute utility. In Windows, go to the command window, and type tracert, followed by an IP address or a domain name.You use the traceroute utility. In Windows, go to the command window, and type tracert, followed by an IP address or a domain name.You use the traceroute utility. In Windows, go to the command window, and type tracert, followed by an IP address or a domain name.You use the traceroute utility. In Windows, go to the command window, and type tracert, followed by an IP address or a domain name.


What does tracert mean?

the network path to a destinationAnswerTraceroute ( or Tracert )is a comp network tool used to determine the route taken by packets across the IP network. Tracert is a tool which is used on Microsoft window Operating system, while traceroute tool is available on particular Unix-like OS....Tracert n Traceroute are same in functionality bt having differt names in different Operating sys.


What utility attempts to trace the path that a packet takes through the network?

tracert (traceroute on unix-like systems) will do this. use the command tracert /? for more information on options for this command, such as the maximum number of "hops".


Why would a network administrator use the tracert utility?

to identify where a packet was lost or delayed on a network


What is the use of interrupt vector?

An interrupt vector is the memory address of an interrupt handler, or an index into an array called an interrupt vector table or dispatch table. Interrupt vector tables contain the memory addresses of interrupt handlers. When an interrupt is generated, the processor saves its execution state via a context switch, and begins execution of the interrupt handler at the interrupt vector.


What is the use of ping command in ms-dos?

Ping command is used to check the network connectivity. You can use ping command from windows shell only, not from DOS OS as DOS does not supports networking. You can use "-t" switch with ping for continuously network checking.Syntax: Ping Example: ping 192.168.1.15 or ping 192.168.1.15 -t or ping -t 192.168.1.15


What TCPIP utility would you use to display the route taken over the internet by a communication between a Web browser and a web server?

On a Windows operating system go to Start > Run type "tracert [server address]" (without the quotes) and press enter. For example type: tracert www.google.com Tracert (Tracert.exe) - Traces and displays the route taken from the host to a remote destinations; Tracert is one example of a trace-routing utility.