We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Check Writers' Offers

What's Your Topic?

Hire a Professional Writer Now

The input space is limited by 250 symbols

What's Your Deadline?

Choose 3 Hours or More.
Back
2/4 steps

How Many Pages?

Back
3/4 steps

Sign Up and Get Writers' Offers

"You must agree to out terms of services and privacy policy"
Back
Get Offer

The Functions Of Command Prompt Computer Science Essay

Paper type: Essay
Pages: 7 (1688 words)
Categories: Computer, Essay, Science
Downloads: 5
Views: 1

Everyone knows that what is Command Prompt fundamentally it is see a web application that provided in every Windows ‘ . It is really utile for cyberspace troubleshooting or computing machine troubleshooting. How the bid prompt can assist out in trouble-shooting the web? By utilizing some bid, it can look into that where the job occur. For illustration, look into whether the Internet Service Provider ( ISP ) is down, modem failure, computing machine failure, or the LAN overseas telegram failure.

It besides bring harmful for those who use it in the unmoral manner, for illustration like look intoing IPs, entree a computing machine by utilizing IP reference, directing mass bundles to a specific IP users and etc. There is besides some basic mistake checking by utilizing bid prompt, it can look into that whether there is any malware, Trojan, worms, key-logger or any 3rd party package that are attaching in the computing machines. In this research, there is command account portion and it includes the manner of utilizing the bid to troubleshooting.

This bid will demo all connexion that is coming in and out of your web interfaces. What ports your personal computer is listening to, who is connected to your Personal computer and who you are connected to. You can make a netstat / ? to see what exchange are available and its corresponding maps. You can even bind each connexion to its matching procedure ID to see which procedure is responsible for what procedure ID. Eg. netstat -n or netstat -b. Netstat bid can utilize to expose the protocol statistics and current TCP/IP web connexion. Basically the most popular bid is ‘netstat -n ‘ , it is use to look into the active connexions whether holding some job or non. For illustration, if the specific computing machine is contains some viruses, Trojan, Malware, or key-logger, we can easy place that it is in leery file. We can take it by utilizing Task Manager ( Ctrl + Alt + Delete ) . In the procedure check, we can happen the unknown procedures file.

Nslookup

This bid is use to make a DNS forward or change by reversal DNS search for a peculiar sphere or IP reference. Eg. nslookup www.yahoo.com or nslookup 72.30.2.43. Nslookup bid is use to look into the IP reference of a specific URL, for illustration ‘C: UsersCheong & A ; gt ; nslookup www.google.com ‘ it will expose the IP reference of Google. You can seek it out by come ining the IP reference in IE ; it will besides link to Google web site every bit good.

Route print

This bid will demo you the routing tabular array in your laptop. It shows how traffic is routed at different interfaces on your laptop. You can cancel or add path manually utilizing this bid.

Eg path print

Pinging

This is a basic public-service corporation to see if an IP reference is presently up, and besides a really basic but powerful web trouble-shooting tool.

Eg. ping www.yahoo.com or tracert 72.30.2.43

Normally the Ping bid is use to follow the velocity of a web or the respond clip of a web site. In more item, Pinging bid can make a batch of things. There are two facts, one is good and one is bad, the good fact is it can look into assist the web applied scientist to place the web public presentation, the velocity, and etc. But the bad fact is that it can upset other user web, for illustration ‘ping 192.168.X.X -t -l 1000 ‘ this bid is directing one 1000 package to the specific user in every 2nd and this will do the user web traffic will throng if the user RAM is non strong plenty. This instance was happen in 90 ‘s, and is named as ‘dot killer ‘ last clip.

Eg. ping www.yahoo.com -t -l 1000 or ping 72.30.2.43 -t -l 1000

Way to work out

The manner to work out the ‘dot slayer ‘ is now really easy and fast, we merely necessitate to put the window firewall puting on and travel to progress puting check and travel to ICMP scene and unmark all the pronounced grade. The scene is do n’t let any user or computing machine to Ping, and can non look into the specific IP straight. After done the scene, it might procure every bit long as we ne’er entree to any insecure web site or web page.

Enterprise Use

Basically, this application can utilize in endeavor, for illustration it can utilize to trouble-shoot web, look intoing viruses, look into the position of a IP or URL, and etc. This might assist the web engineer a batch, since it is a simple application and can easy larn it. I believe that it can assist a batch in the endeavor use.

Command prompt can be utile in the web trouble-shooting and can be used as a web tools and are often used by experient web admins to trouble-shoot web related jobs. So that if a little company or a big company besides can utilize this application to trouble-shoot some web job easy, and the full company can salvage some cost of engaging a professional web applied scientist to assist to keep the company webs.

This application besides can assist to happen out some viruses that are in our computing machines, if there are any malicious procedures running on the background which are linking to the cyberspace. The consequence can so be cross referenced against good known procedures. These are often used by security expert to place malware or viruses on a Personal computer or waiter. So that the employee can besides keep their ain computing machines or lap-top easy by utilizing this application and some bids.

If there is some company is concern utilizing web site, they can utilize this application to look into whether their web site is down or busy. We can utilize ping bid to look into, it is an easy manner to find if an IP reference or service is up or down. There is another manner besides, for illustration utilizing telnet www.yahoo.com 80, this means I am telnetting www.yahoo.com at port 80. If you get a space screen that indicates that the service is up.

Advantages

Common application

It is a common application that installed in every individual operating systems, it is easy to utilize and can easy happen the map of bid in the cyberspace.

User friendly

When we utilizing this application, one time we face job about the bid we can type illustration ping / ? Or any bid / ? Then it will start out all the bid with a brief account.

Trouble-shooting web

We can cognize whether the full service is up or down is by telnetting to it at the port which it is running on. For illustration if you want to do certain if a web service is up you can establish your bid prompt and type telnet www.yahoo.com 80. This means I am telnetting www.yahoo.com at port 80. If you get a space screen that indicates that the service is up.

Identify Malicious

It besides can be used to place if there are any malicious procedures running on the background which are linking to the cyberspace. These are often used by security expert to place malware or viruses on a Personal computer or waiter.

Figure out latency issues

We can utilize Ping or tracert bid to calculate out latency issues in a web or even to find server or service handiness. If you are good at scripting you can publish a uninterrupted Ping to a finish waiter and roll up the consequences in a graphical format.

Disadvantages

Make a specific IP traffic busy

The Ping bid can utilize it in a bad manner, for illustration if we hate person or any website. We can direct a busy package to the full web site or IP user by utilizing ‘ping -t -l 1000 ‘ and this bid will automatically direct 1000 bytes of package to the web site or IP and do it busy, so that the users who wanted to entree to this web site or IP will takes a long clip to entree it.

Limited information provide

It is similar CISCO but CISCO will demo detail information instead than command prompt, for illustration when we type in path print, it will demo merely some basic information like IPv4 tabular array, and IPv6 tabular array. In IPv4 tabular array it will demo the subnet mask, gateway, interface and the web finish. For IPv6 tabular array, it will merely demo the metric web finish and the gateway.

Restriction

Enhance and ascent

This application can non be enhance since it is a default application in the operating systems. It can non be upgrade every bit good, for illustration it can non upgrade the version, maps, interface, and so on.

Fix Commands

In the application itself, the bid all is fix and we must follow the bids. For illustration, if we key in the incorrect or bing bid, the application wo n’t demo any consequence with it, it will merely demo ‘ ‘ is non acknowledge as an internal or external bid.

Graphic User Interface

The GUI is ever fill in colour black and white, the text colour is white and the background colour is black. So the interface is non attractive plenty comparison to others applications.

Decision

In the decision, harmonizing to my research I found that the Command Prompt is still a complicated application due to there are excessively much of different bids and inside those bids are consist of some sub bids. The bid such as Ping or even tracert can be used to calculate out latency issues in a web or even to find server or service handiness. There are even commercially available tools or web monitoring applications that uses ping to supervise IP turn to up clip and down clip. If you are good at scripting you can publish a uninterrupted Ping to a finish waiter and roll up the consequences in a graphical format. I believe that there is still many parts I still need to research and analyze it more item, so that merely can work it absolutely and easy.

Experiment and Print screen

Netstat -n bid end product

Ipconfig bid end product

Nslookup bid end product

Netstat -b bid end product

Pinging bid end product

Route print bid end product

Cite this essay

The Functions Of Command Prompt Computer Science Essay. (2020, Jun 02). Retrieved from https://studymoose.com/the-functions-of-command-prompt-computer-science-new-essay

How to Avoid Plagiarism
  • Use multiple resourses when assembling your essay
  • Use Plagiarism Checker to double check your essay
  • Get help from professional writers when not sure you can do it yourself
  • Do not copy and paste free to download essays
Get plagiarism free essay

Not Finding What You Need?

Search for essay samples now

image

Your Answer is very helpful for Us
Thank you a lot!