1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Black_prince [1.1K]
2 years ago
7

You are working at the help desk and you get a message that a user cannot access the internet. you open a command prompt, ping t

he workstation's ip address, and get a response. you ask the user to try the internet again. he does so with the same result-no connection. which type of device is most likely to be the problem
Computers and Technology
1 answer:
Kaylis [27]2 years ago
4 0

Answer:

The ethernet cable.

Explanation:

The connection to the switch or router might be disrupted with the disconnection of the cable. Ask the user to check if the ethernet cable is properly connected.

You might be interested in
What is a benefit of the Name Manager feature?​
Ostrovityanka [42]
Makes it personalised to you. If you don’t want people to use your excel work , putting your name on it or the person it belongs to’s name can make sure that it belongs to you or who it is meant to belong to.
6 0
3 years ago
Read 2 more answers
Which diagram is used as a popular technique for investigating causes and effects? 1. Cause and effect 2. Fishbone/lshikawa 3. R
pishuonlain [190]

Answer: 2)Fishbone/lshikawa

Explanation: Fishbone diagrams are those diagrams which help in the identification of the problem causing factors and reasons behind.This diagrams find the roots of the problem to solve it. Fishbone diagram is also known as the Ishikawa diagram.

The other given options are incorrect because they are not any technique for finding the roots of the problem.Thus, the correct option is option(2).

8 0
3 years ago
A ____ document identifies the purpose of the program being developed, the application title, the procedures to be followed when
telo118 [61]

Answer:

requirements

Explanation:

<h2><u>Fill in the blanks</u> </h2>

A <u>requirements</u> document identifies the purpose of the program being developed, the application title, the procedures to be followed when using the program, any equations and calculations required, any conditions within the program that must be tested, and any notes and restrictions that must be followed by the program.

7 0
3 years ago
What is occurring when an attacker manipulates commonplace actions that are routinely performed in a business?
serg [7]

Answer:

Vulnerable business processes, also called business process compromise (BPC), occurs when an attacker manipulates commonplace actions that are routinely performed.

4 0
3 years ago
Small programs are shortcuts that are displayed as graphics pinned to your desktop are called_____
steposvetlana [31]

Answer:

Taskbar or they are pinned to desktop

Explanation:

3 0
3 years ago
Other questions:
  • Which two technologies support the building of single-page applications?
    11·1 answer
  • In internet terminology, what is the term, .com, called?
    12·2 answers
  • What does the group on option do?
    10·1 answer
  • How did the discovery of glossopteris support wegner's continental drift hypothesis?
    15·1 answer
  • What is the importance of human flourishing to science and technology?​
    8·1 answer
  • A recommended cleaner for the bowls of coffee brewers is
    7·1 answer
  • Hey mates.........needed asap 1.) Mention and explain four (4) ICT gadgets,
    9·2 answers
  • Activity
    7·1 answer
  • What dd command would you use to copy the contents of a partition named /dev/drive1 to another partition, called /dev/backup?
    6·1 answer
  • Paula weeded 40% of her garden in 8 minutes. How many minutes will it take to weed all of her garden at this rate ?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!