Write the number stops achieved for each website

Assignment Help Computer Engineering
Reference no: EM133472982

Discussion Post: Computer Science

Website I:

Your favorite web site overseas and preferably NOT English Language. And its short description. The URL must have the country extension.

Example of websites with county extension

www.--------.ac.in : Website in India

Do your web search and the find the website that you want to use. And provide the screenshot the first page of your website.

Website II:

Your favorite web site in the USA preferably English Language (it can be sports team, car manufacture, fashion, music band, restaurant or your favorite person's website or something similar). And provide the screenshot the fist page of your website.

Have these two websites for the following questions.

Question A:

Using Whois domain lookup to see the ownership and tenure of a domain name.

And provide the report of each website by providing for each website.

1. Registrant Contact Name and City:
2. Registered On and Expires On:

Question B:

Open the MS command prompt on your computer and do ping to your two websites one by one. And, provide the screenshots. Answer the following questions for each website.

For example C:\Users\myComputer > ping www Your Favorite Website com

1. How many packets were sent?
2. How many packets were received?
3. Approximate time of round trip
4. TTL ( allocated time to live for the package ) for each website

Question C:

Windows-based system, use the command prompt and execute tracert and the URL of the two websites that you have declared. tracert will be displaying the route and measuring transit delays of packets across Internet.

For example C:\Users\myComputer > tracert www.Your Favorite Website.com

Compare both results by identifying all intermediate hops between the nodes for each URL.

Write the number stops (hops) achieved for each website. Which one has more hops ? Why?

Question D:

Open the command prompt and for each web site do nslookup (name space lookup) nslookup allows you to query the D N S database from any computer on a network.

• Do nslookup form your computer command line to find the IP address of the web sever of the two websites

Example C:\Users\myComputer > nslookup www.Your Favorite Website.com. And,

Use ipvoid com find website ip to Find the IP address of the web sever of the two websites Compare the Ip addresses you have gathered form nslookup and ipvoid.com for the same website.

• Then use iplocation net/ to see location of a website. And provide short report on; country, region and city of each websites' server location (for each website)

Question E:

Use the undersea fiber optic cable map and answer the following questions.

• Find the Caucasus Cable System on the undersea fiber optic cable map. And visit the owner of the cable and see what kind of products they offer.

Reference no: EM133472982

Questions Cloud

Create a ppt with audio narration for the stakeholders : Create a PowerPoint slides Presentation with audio narration for the stakeholders of your chosen company option that summarizes what you did over the course.
Analyze the incident response process : Analyze the incident response process. Would the process of incident response change if a crime was intentionally committed versus an accidental event.
What legal structure of business will you choose and why : What legal structure of business will you choose and why? Research your industry and provide an industry analysis which should discuss relevant trends.
Jesus connect with creation story in genesis : How does the story of the birth of Jesus connect with the creation story in Genesis? What is the significance of the connection.
Write the number stops achieved for each website : IT 505- Write the number stops (hops) achieved for each website. Which one has more hops? Find the Caucasus Cable System on the undersea fiber optic cable map.
Explain historical-cultural context that produced literature : Explain historical-cultural contexts that produced literature. Exercise different methods of interpretation from various theological and cultural perspectives
How to pronounce knife also won his child prize in the end : How to Pronounce Knife" also won his child's prize in the end of the story? How does Vincent Chen's concept of "inauthenticity" inform your understanding
What are the threats to personal privacy posed by internet : IT501- What are the threats to personal privacy posed by the Internet, and what actions can you take to safeguard user privacy?
Description of isaac and rebekahs meeting and genesis : There are no parallels between Genesis 24's description of Isaac and Rebekahs meeting and Genesis 29's description of Jacob and Rachels meeting.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Explain microsoft licensing for virtualized environments

This week, you have read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case.

  Privacy and data sovereignty strategy assessment

Security, Privacy and Data Sovereignty strategy Assessment - Discusses the possible threats and risks to the security of user data on mobile phones

  Creating a static method

Write down a static method, getBigWords, which takes a String parameter and returns an array whose elements are words in the parameter that consists of more than 5 letters.

  Generate and displays fibonacci sequence numbers

Write a program that generate and displays Fibonacci sequence numbers.The program should be interactive and display the range of Fibonacci sequence.

  Write a program that request a student lastname

Write a program that request a student LastName and Social Security Number.

  Describe the factors that determine the tone at the top

How would you describe the factors that determine the tone at the top? Using 300-350 words, write a brief discussion, in your own words of how the article.

  Write a single statement to display the number of digits

Write the statement to instantiate a package to do input and output with US_Gallons. Write a single statement to display the number of digits of precision used.

  Provide a write up on your understanding of application

What are the techniques you will account for when considering hardening solutions for application/OS security?

  Calculate the key and compare the value

Calculate the key and compare the value to _KEY . If the two match, the user (most likely) entered the correct password, otherwise he loses one chance.

  Create spreadsheet of vulnerabilities and prevention measure

Create a spreadsheet of vulnerabilities and prevention measures for your organization. Categorize by people, process, or technology.

  Write code for the methods double-stack

Write code for the methods Double_stack( ), push_a( ), push_b( ), pop_a( ), and pop_b( ) to handle the two stacks within one Double_stack.

  Explain the challenges the organization had

Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd