Why can't I access (ping) my public IP from within my private network?

1 Answer

Answer :

hold windows key+r then type cmd press enter Then type ipconfig it should show up. Or are you wondering how to change it?

Related questions

Description : When you ping theloopback address,a packet is sent where? A. On the network B. Down through thelayers of the IP architecture and then up thelayers again C. Across the wire D. through the loopback dongle E. None of the above

Last Answer : Down through thelayers of the IP architecture and then up thelayers again

Description : My mac mini running 10.6.2 OS X self assign's itself an Ip instead of connecting right away to my network. Thus, can't access Internet till I correct it. Any advice mac friends?

Last Answer : Do you have it set to connect with DHCP? Pic

Description : Which among the following is correct: a) An IP address can be private - for use on Local Area Network (LAN). b) It can be use on the internet or other wide area network (WAN). c) IP addresses ... dynamically (assigned by another device on the network on demand). d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Which among the following is correct: a) An IP address can be private - for use on Local Area Network (LAN). b) It can be use on the internet or other wide area network (WAN). c) IP addresses ... dynamically (assigned by another device on the network on demand). d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : A hardened firewall host on an intranet (i) has a proxy application gateway program running on it (ii)Allows specified internet users to access specified services in the intranet (iii) Initiates all internet activities requested by clients ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : c. i, ii, iii, iv 

Description : In the TCP/IP protocol architecture, the Network Access Layer includes ………………………………...layers of the OSI Reference Model. A. presentation, session, application B. physical, data link, network C. data link, network D. physical, data link

Last Answer : B. physical, data link, network

Description : What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model? a. Internet b. Host to host c. Network Access d. Application

Last Answer : b. Host to host

Description : How do you use iptables to route using private IP networks?

Last Answer : answer:You can use the ip route command or the route command to accomplish this assuming that the 10.0.5.0 network is attached to a separate interface from the 192.168 interface. The interfaces ... does. Frankly I prefer the ip command anyway, but I used route because it's more widespread.

Description : The …………………... command can set or display the configuration values for a network interface. A. ping B. traceroute C. ifconfig D. finger

Last Answer : C. ifconfig

Description : Which command is used to test network connectivity and provide a response to each packet received by the remote host? a.test b.tracer c.ping d.connect

Last Answer : c.ping

Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way

Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way

Description : When using a computer with a built in cellular card for internet access, how is your IP number decided?

Last Answer : answer:What are you calling into to connect to the Internet? That system will determine your IP on the Internet. What computer are you using that you don't know how to check your current IP address? If ... go to a web site that tells you what your IP address is. Like: http://whatismyipaddress.com/

Description : Which lottery procedure do you believe is more honest? Computer generated numbers or ping pong balls?

Last Answer : Ping pong balls for the win! They’re so happy bouncing around in the air currents in the machine, and then one pops up and another and another. It’s simple more fun.

Description : Nerding it up: features for a ping pong computer.

Last Answer : boss alarm? Or maybe a score/record read out at the end of game?

Description : What is ping?

Last Answer : We use it to determine who serves first in Ping Pong P – I – N – G

Description : Which among the following is correct: a) A firewall is a system designed to prevent unauthorized access to or from a private network. b) Firewalls can be implemented in both hardware and software or a combination of both. c) Both of Above d) None of these

Last Answer : c) Both of Above

Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.

Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic

Description : What are two common concerns in a cloud environment? A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access to private ... in the cloud. D. Running out of storage space and network bandwidth at peak usage times.

Last Answer : Illegal access to private data stored by applications in the cloud.

Description : Briefly explain the difference between Public (public), Friend (internal), and Private (private) access levels as they apply to user-defined types and members.

Last Answer : In user-defined types, Public (public) classes can be instantiated by any element of the application. Friend (internal) classes can be instantiated only by members of the same assembly, and Private ( ... the same assembly, and Private (private) members can be accessed only from within the type. 

Description : An enterprise needs highly controlled storage and access to their databases as well as managing the infrastructure for web front ends and other applications. They have a large existing IT infrastructure and they ... to reduce cost? A. public cloud B. hybrid cloud C. private cloud D. internal cloud

Last Answer : hybrid cloud

Description : Which statement is true about the security of the cloud computing environment? A. It is compromised because it is a shared environment. B. Multitenant applications are not able to run in a cloud ... a private cloud. D. Access to critical data is better controlled in a private cloud environment.

Last Answer : Access to critical data is better controlled in a private cloud environment

Description : Intranetsand extranets can use their network fire walls andother security features to establish secureInternet links within an enterpriseor with its trading partners. Select the best fit for answer: A. Network Server B. Virtual Private Network C. Networkoperating system D. OS

Last Answer : Virtual Private Network

Description : The __________ allows systems and services to be accessible within an organization. A. Private cloud B. Public cloud C. Community cloud D. Hybrid cloud

Last Answer : A. Private cloud

Description : The Network is overloaded with enormous data sent by many computers within the network. The inability of the network to deliver the data is termed as __________ . (1) Access control (2) Congestion (3) Error propagation (4) Deadlock

Last Answer : Congestion

Description : A company wants to build a test environment to test software updates and new solutions. The environment should mirror the production environment and be secure and inaccessible from outside the company ... requirements? A. Public Cloud B. Private Cloud C. External Cloud D. Virtual Private Cloud

Last Answer : Virtual Private Cloud

Description : A ..................is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN

Last Answer : B) VPN

Description : A ………………. is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN

Last Answer : B) VPN

Description : Air-tech management learns that last month's production run of heaters is defective and announces a recall of the specific models produced. To handle the large number of products ... distribution centre B)private warehouse C)dispatching shipment system D)public warehouse E)materials handling system

Last Answer : D)public warehouse

Description : During a merger and acquisition transaction, the ability to find and use good comparable data for a valuation is relatively ____________. a) easy because each successful company within an industry ... depth, product diversity and access to lines of credit seldom match the company being valued

Last Answer : d) difficult because size differential, management depth, product diversity and access to lines of credit seldom match the company being valued

Description : How do I make my wireless network private?

Last Answer : what router are you using?

Description : A company wide network,closed to public access,which uses internet type technology is called a)Intranet b) Internet c) Extranet d)none of these

Last Answer : a)Intranet

Description : In public switched telephone network, LATA stands for ______ a) Local access and transport area b) Land area and transport area c) Local access and telephone access d) Local area and telephone access

Last Answer : a) Local access and transport area

Description : I desire to watch a BBC2 special from the USA. How do I go about blocking my IP address to get access to view?

Last Answer : Try the Hola unblocker extension.

Description : Before I run the website completely, I would only like to have access. It's just that if there's a password, so that only I can get to the site and test. I know how to make sure that a certain IP address does not get there, but I need the opposite so that only one IP address gets there.

Last Answer : Herold, create a .htaccess file in Notepad and name it exactly like that with the dot .htaccess Write in it: order deny, allow deny from all allow from 125.45.87.896 Change that IP address for ... upload the file to the root folder web. Only the registered IP address will have access to the website.

Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1) Application layer Firewall 2) Packet Filtering Firewall 3) Router enhanced firewall 4) IP enabled firewall

Last Answer : 2) Packet Filtering Firewall

Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1 Application layer Firewall 2 Packet Filtering Firewall 3 Router enhanced firewall 4 IP enabled firewall

Last Answer : 2 Packet Filtering Firewall

Description : Proxy application gateway (i) acts on behalf of all intranet users wanting to access interne securely (ii)monitors all accesses to internet and allows access to only specified IP addresses (iii) disallows use of certain protocols with ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : b. i, ii, iii 

Description : 2 Wifi Routers/Access Points on the same network?

Last Answer : answer:That sounds normal to have to disconnect then reconnect. WiFi is not designed to hand off well, like phone cells are. There are industrial strength APs out there if you get tired of that. Ref the IPs, ... IP have to be in a certain range to work and do your AP and bridge have the IP ranges?

Description : How can i access a network ive been banned from?

Last Answer : Any computer using WIFI has a MAC address, which the network administrator can determine, and allow, or deny access to services, etc. If you do something they don't particularly allow, they can block your ... be something else Either way, talk to them, they might be able to allow you access again.

Description : Why, when I try to browse the Social questions, does my computer try to load ping.chartbeat.net?

Last Answer : Do you know which browser are you using?

Description : How do I fix a ping pong table?

Last Answer : any pics??

Description : Why, when I try to browse the Social questions, does my computer try to load ping.chartbeat.net?

Last Answer : Do you know which browser are you using?

Description : Can Ping be disabled on iTunes?

Last Answer : answer:Ping is built into iTunes & cannot be removed by way of settings/preferences. But if you feel comfortable with using Terminal, you can remove the Ping elements from iTunes with these ... -bool YES This will remove Ping from the sidebar. defaults write com.apple.iTunes disablePingSidebar 1

Description : Ping Pong Table Improvising?

Last Answer : Play on your stomach. Find something else to stand the table on. Have it on the floor and play on it anyway.

Description : We just got a ping pong table at work. Can you help me on my journey to becoming office champion?

Last Answer : This sounds like an episode of the office lol maybe you could find people or a club or the sort as to practice outside of work.

Description : Bruce Lee playing ping pong with nunchucks. Do you think it's real?

Last Answer : It's an ad for a phone, I would guess marketing and some snazzy effects I'm no ping pong expert, but take a closer look at some things in the video and it doesn't seem quite right Specifically the ball ... ball while his back is turned I don't know if even Bruce Lee's Kung Fu was that strong ;)

Description : Is there such a thing as a folding ping pong table?

Last Answer : Yes, amazon has a ton of them. http://www.amazon.com/s?ie=UTF8&search-alias;=sporting&field-keywords;=folding%20ping%20pong%20table&page;=1

Description : Will using an Airport Express as a repeater drive up my ping?

Last Answer : answer:I'm pretty sure your ping time mostly has to do with your internet connection. E.g., pinging my backup server in Utah over a vpn connection gets me 52.367ms replies, but pinging the router on my ... want that time back run a wire across your house =) So, really I wouldn't worry about it.

Description : What's so flippin' special about those olympic ping pong balls?

Last Answer : answer:Hey! What the hell. I did a search for balls and this came up. Geeze. That’s a joke

Description : A soccer fan, upset by the defeat of his favorite team, slept restlessly. In his dream a goalkeeper was practicing in a large unfurnished room, tossing a soccer ball against the wall and then ... crush the ping-pong ball, how did the ping-pong find safety whithout leaving the floor? -Riddles

Last Answer : If the ping-pong ball rolls flush against the wall, the cast-iron ball cannot crush it. Those who know geometry can determine that if the diameter of a large ball is at least 5.83 (3+2(square root of ... is larger than a soccer ball is more than 4.83 times as large in diameter as a ping-pong ball.