1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nat2105 [25]
2 years ago
11

A user reports that he cant browse to a specific website on the internet. From his computer, you find that a ping test to the We

b server succeeds. SA traceroute test dhows 17 hops to the destination web server. WHats the cause of the problem?
Computers and Technology
1 answer:
ikadub [295]2 years ago
7 0

Answer:

Incorrect DNS server address

Explanation:

You might be interested in
Write a program to find the principle amount​
babunello [35]

Answer:

We can rearrange the interest formula, I = PRT to calculate the principal amount. The new, rearranged formula would be P = I / (RT), which is principal amount equals interest divided by interest rate times the amount of time.

6 0
3 years ago
If the user does NOT click the button what color will "topButton" be when this program finishes running?
daser333 [38]

Answer:

Blue

Explanation:

See attachment for missing code snippet.

The actions to be executed are on lines 1, 2, 4 and 5. These actions are:

1. Set background to red

2. Set background to blue

4. Set background to green

5. Set background to orange

Instructions at line 4 and 5 will be executed if the user clicks the button.

From the question, we understand that the user does not click the button.

This implies that the instructions at 4 and 5 will be ignored.

So, we are left with:

1. Set background to red

2. Set background to blue

1. The background colour of the button will be set to red

2. The background colour of the button will be set to blue, overwriting the instruction at (1).

Hence:

<em>B. blue is correct</em>

5 0
3 years ago
Write a note on secondary storage​
12345 [234]
Secondary storage refers to storage devices and media that are not constantly accessible by a computer system. Examples include external hard drives, portable flash drives, CDs, and DVDs.
good luck
4 0
4 years ago
Write a program that takes a point (x,y) from theuser and find where does the point lies. The pointcan
agasfer [191]

Answer:

C++ Program .

#include<bits/stdc++.h>

using namespace std;

int main()

{

int x,y;//declaring two variables x and y.

string s;//declaring string s..

cout<<"enter x and y"<<endl;

cin>>x>>y;//taking input of x and y..

if(x>=0 &&y>=0) //condition for 1st quadrant..

cout<<"the point lies in 1st Quadrant"<<endl;

else if(x<=0 &&y>=0)//condition for 2nd quadrant..

cout<<"the point lies in 2nd Quadrant"<<endl;

else if(x>=0 &&y<=0)//condition for 3rd quadrant..

cout<<"the point lies in 3rd Quadrant"<<endl;

else //else it is in  4th quadrant..

cout<<"the point lies in 4th Quadrant"<<endl;

cout<<"enter n to terminate the program"<<endl;

while(cin>>s)//if the user has not entered n the program will not terminate..

{

   if(s=="n")

   {

       cout<<"the program is terminated"<<endl;

       exit(0);

   }

   cout<<"you have not entered n please enter n to terminate the program<<endl;

}

}

Explanation:

The above written program is for telling the point lies in which quadrant.I am first declaring two variables x and y.Then after that taking input of x and y after that checking in which quadrant the point lies.

Taking input of the string s declared earlier for program termination the program will keep running until the user enters n.

4 0
3 years ago
Explain the theory of electro-magnetism
solong [7]
Electro magnetism theory cover the basic principle of electro magnetism : experimental basis.
Electromagnetism is defined as an attraction between two partical.
3 0
3 years ago
Other questions:
  • Ryan has created a Word document to be used as a review quiz for students in a classroom setting. The document contains both que
    6·1 answer
  • A security analyst believes an employee's workstation has been compromised. The analyst reviews the system logs, but does not fi
    7·2 answers
  • Which of the following is not one of the Generally Accepted Recordkeeping Principles ("The Principles®")? a. Accountability b. S
    11·1 answer
  • (Help please I don't know what to choose because it's both text and email but I can only pick one. HELP!!!!!!!!!!)
    6·2 answers
  • Name three output devices
    6·1 answer
  • An example of hardware is a(n) _____.
    9·2 answers
  • Cryptography has requirements include:
    8·1 answer
  • Define a class named person that contains two instance variables of type string that stores the first name and last name of a pe
    14·1 answer
  • Draw a flowchart and write the algorithm to find even number between 1 to 50​
    7·1 answer
  • What is the best way to share a document that contains many image or audio files.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!