answersLogoWhite

0


Best Answer

You use the traceroute utility. In Windows, go to the command window, and type tracert, followed by an IP address or a domain name.

You use the traceroute utility. In Windows, go to the command window, and type tracert, followed by an IP address or a domain name.

You use the traceroute utility. In Windows, go to the command window, and type tracert, followed by an IP address or a domain name.

You use the traceroute utility. In Windows, go to the command window, and type tracert, followed by an IP address or a domain name.

User Avatar

Wiki User

14y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

14y ago

You use the traceroute utility. In Windows, go to the command window, and type tracert, followed by an IP address or a domain name.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What utilities would you typically use to determine the number of hops to a specific destination?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

What destination IP address is used in a unicast packet?

specific hosta specific host


What do you mean by Binding time?

It means you are waiting...typically in a relaxed manner and typically one who is binding their time is waiting for something "evident" to transpire, or waiting to see what may happen concerning a specific event or issue.


Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations?

cost benefit analysis


The firewall determines if network traffic should continue on to its destination or be stopped.?

A firewall can block/open particular ports without prejudice. Yes, a firewall does determine if network traffic should continue through to the destination or be stopped. Therefore keeping unwanted materials out. Yes, firewalls are in charge of deciding whether a piece of network traffic should be allowed past the firewall to travel onwards to its destination or if it should be stopped. Rules can be set at the firewall to prevent traffic from entering your local network that you do not want to. A modern firewall can be programmed to block or or pass through (with or without modification) packet traffic based on its source or its destination or both. It can select packets based on an IP address, a range of ip addresses, network or subnet. It can use port numbers to filter or redirect packets to specific ip addresses. Better ones can select packets based on the domain name, or part of it or even block based on the contents of a web page. Of course, it may also block access to a really nice chicken breast recipe because of one word. Some firewalls can even filter based on the category association of a host or domain name. For example, you can block web sites that involve drugs and alcohol, or sites associated with sex and nudity.


What could prevent a ping fom being sent to between the PCs?

Related questions

What are examples of things you can measure in kilograms?

A kilometer is a way of measuring distance, typically used to determine how far one place is from another. A specific example is a road sign, that tells you how far that sign is from a destination such as a city or landmark.


A client is communicating with a server on a different segment of the network how does the server determine what service is being requested by the client?

The server knows by the destination port number, which attaches a listening program to a specific protocol.


What is random patrol?

One with no specific destination or aim


Define an excursionist?

An excursionist is a person who goes on a short journey or trip for pleasure, typically for a day or part of a day, often with a specific destination or activity in mind.


What destination IP address is used in a unicast packet?

specific hosta specific host


Found on chromosomes they determine specific characteristics of the orgsmism?

Genes determine the specific characteristics of an organism.


What is site evaluation?

Site evaluation refers to the process of assessing a location's suitability for a specific purpose, such as building construction or environmental conservation. Factors like soil quality, topography, access to utilities, and zoning regulations are typically evaluated during site assessments to determine the feasibility and potential challenges of development projects. The goal is to ensure that the site meets the necessary criteria and requirements for the intended use.


What is the function of diagnostic utilities and tools?

The function of diagnostic utilities and tools are toÊlocate, identify, and repair faults in the specific application that is being tested. Diagnostics are used alot in the medical field.


Can landlord charge extra money for electricity which he claims that utilities are included originally?

In Massachusetts, the law requires that there be a specific written agreement that the tenant will be charged for utilities. Many states are the same.


What country was the destination of the trade route?

Can you be more specific? What trade route??


Who was the first person born in 1234?

It is not possible to definitively determine who the first person born in 1234 was, as historical records do not typically include such specific details about individuals.


Difference between operating system software utilities and drivers?

OS is a software that enable user to command the hardware software utilities are programs to help/improve a specific job of the OS. drivers are program that tells the OS how to let user command the specific device the driver is for.