answersLogoWhite

0


Best Answer

Ping

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What computer network tool is used to test whether a particular host is reachable across an IP network?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

What is used to determine whether a remote computer is on the same network or a remote network?

subnet mask


Whether connecting to the internet or to another computer within a LAN every node on a network must have a unique?

ip address


Can you use utp cable for 220 v?

No. Network cables have their own voltages, set by the network card. If you network card doesn't go up in smoke, you should not worry whether the computer is plugged into 110 or 220 V. Your computer's power supply takes care of providing the electronic components with appropriate voltages. These voltages are much lower than the 110 or 220V at your home; also, they are DC instead of AC.No. Network cables have their own voltages, set by the network card. If you network card doesn't go up in smoke, you should not worry whether the computer is plugged into 110 or 220 V. Your computer's power supply takes care of providing the electronic components with appropriate voltages. These voltages are much lower than the 110 or 220V at your home; also, they are DC instead of AC.No. Network cables have their own voltages, set by the network card. If you network card doesn't go up in smoke, you should not worry whether the computer is plugged into 110 or 220 V. Your computer's power supply takes care of providing the electronic components with appropriate voltages. These voltages are much lower than the 110 or 220V at your home; also, they are DC instead of AC.No. Network cables have their own voltages, set by the network card. If you network card doesn't go up in smoke, you should not worry whether the computer is plugged into 110 or 220 V. Your computer's power supply takes care of providing the electronic components with appropriate voltages. These voltages are much lower than the 110 or 220V at your home; also, they are DC instead of AC.


If you want to connect your computer to a network but your has a different operating system from the other computer on the network what can you do?

The computers should still be able to communicate with each other, regardless of whether or not they are all using the same operating system, as long as all of the computers are on the same network.


What is the use of ping in networking?

Ping is a computer network administration utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer. Ping is used to identify if there is an internet connection and how fast it is.

Related questions

What is ping 4.2.2.2?

a computer network tool used to test whether a particular host is reachable across an IP network


How can you tell whether the printer has been shared?

To check whether a printer is shared or not go to devices on the computer and note whether the printer is listed for that particular computer. Do this for each computer in question.


What is the network setting that affects whether your computer can see other computers and devices on the network and whether other computers on the network can see your computer?

The subnet mask and the default gateway.


What is used to determine whether a remote computer is on the same network or a remote network?

subnet mask


What is used to identify whether a remote computer is on the same network or a remote network?

check the ip of the remote computer and yours, use ipconfig command


When a computer sends a frame to another computer do other computers on that network receive the frame?

That would depend on the network topology chosen and the type of network connectivity devices employed. In a properly constructed, switched and/or routed network the answer would be NO. If hubs or repeaters are used to connect devices and/or network segments, then yes. In a bus or ring topology, the answer is yes. Whether anything is done with the frame is a different matter and depends on whether you consider the network adaptor to be integral to the computer.


What protocols is used by the Ping command to inquire whether an address is reachable on the Internet?

ping


What is the Remoting application in Net?

NET remoting enables you to build widely distributed applications easily, whether the application components are all on one computer or spread out across the entire world. You can build client applications that use objects in other processes on the same computer or on any other computer that is reachable over its network. In short NET remoting provides an abstract approach to inter-process communication For more details try readinghttp://www.codeproject.com/useritems/Remoting_Architecture.aspHope this helps


Why do a lot of things say you have to log in or register to do stuff on the computer?

That depends on the operating system you have and whether or not you are connecting to the network.


Why is a computer network useful?

Computer networks have several important purposes in the business and personal world. Whether a company or group needs to share resources, files, or even printing capabilities, a computer network will allow for it.


Whether connecting to the internet or to another computer within a LAN every node on a network must have a unique?

ip address


Someone you dont trust pinged your computer what can you do?

A "ping" doesn't mean much; it simply reveals whether your computer is reachable, or not.It may be part of a larger attack, so you may want to watch out for other suspicous signs. For example, a port scan would be much more suspicious: an automated program that checks which ports can be accesed.A "ping" doesn't mean much; it simply reveals whether your computer is reachable, or not.It may be part of a larger attack, so you may want to watch out for other suspicous signs. For example, a port scan would be much more suspicious: an automated program that checks which ports can be accesed.A "ping" doesn't mean much; it simply reveals whether your computer is reachable, or not.It may be part of a larger attack, so you may want to watch out for other suspicous signs. For example, a port scan would be much more suspicious: an automated program that checks which ports can be accesed.A "ping" doesn't mean much; it simply reveals whether your computer is reachable, or not.It may be part of a larger attack, so you may want to watch out for other suspicous signs. For example, a port scan would be much more suspicious: an automated program that checks which ports can be accesed.