1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotegsom [21]
4 years ago
9

A student is helping a friend with a home computer that can no longer access the Internet. Upon investigation, the student disco

vers that the computer has been assigned the IP address 169.254.100.88. What could cause a computer to get such an IP address? a. static IP addressing with incomplete information b. interference from surrounding devices c. reduced computer power supply output d. unreachable DHCP server
Computers and Technology
1 answer:
Firlakuza [10]4 years ago
8 0

Answer:

Option (D) is the right answer.

Explanation:

DHCP term used as a short form of dynamic host configuration protocol, which is used to assigns the IP address automatically according to the network.

According to the scenario, the system is getting the wrong IP address that resulting in internet disconnection which is a failure of the DHCP server because it is responsible for assigning the right IP address to the system.

Hence option (D) is the most appropriate answer.

While other options are wrong because of the following reasons:

  • Static IP is the type of IP address which is fix and doesn't change in the system after rebooting, hence it has no connection in the change of IP address.
  • If the DHCP server is working well there is no chance of interference from the surrounding device.
  • Network setting has no connection with computer power supply as SMPS is used to give power and boot system only.
You might be interested in
John is runnig his Database application on a single server with 24 Gigabytes of memory and 4 processors. The system is running s
spayn [35]

Answer:

Vertical Scaling

Explanation:

Vertical scaling means the ability to increase the capacity of existing hardware or software by adding resources. In this case, more GB is added (8GB) to the server to address the problem. So vertical scaling is the resultant type john is expecting.

3 0
3 years ago
The smallest building block of a wireless lan is a ______.
Anarel [89]
Wireless LAN, or also denoted as WLAN is a Local Area Network that uses wireless communication. The standard for WLAN is given in IEEE <span>802.11 </span><span>
The smallest building block of a Wireless LAN is a basic service set (BSS).</span><span> This set consists of wireless stations which are executing the same MAC protocol and competing for access to the same shared wireless system.</span>
6 0
3 years ago
Basic rule for java languague
Liono4ka [1.6K]
<span>A program should be readable. All the other rules on this page can be overridden by this primary rule. Your programs should display good taste, which you can generally acquire only by paying attention to the practices of other, expert programmers.</span>
6 0
3 years ago
Read 2 more answers
Trace the evaluation of the following expressions, and give their resulting values. Make sure to give a value of the appropriate
Masja [62]

Answer:

(a)\ 14"."43

(b)\ 0"0"7

(c)\ 2"8 - 2"611

(d)\ 7"(1 + 1)"46

(e)\ "1"23"4"30"7"17

Explanation:

Required

Evaluate each expression

The simple rules to follow are:

(1) All expressions in bracket will be evaluated based on its data type

(2) Divisions will return only integer values

(3) Integers immediately after string values will be concatenated (not added)

So, the results are as follows:

(a)\ 4 + 1 + 9 + "." + (-3 + 10) + 11 / 3

Evaluate till a string is encountered

4 + 1 + 9 = 14

Followed by "."

Then:

(-3 + 10)   = 7

11/ 3 = 3

"." + (-3 + 10) + 11/3 = "."73 -- because expressions after string operations are concatenated.

So, we have:

4 + 1 + 9 + "." + (-3 + 10) + 11 / 3 = 14"."43

(b)\ 8 + 6 * -2 + 4 + "0" + (2 + 5)

Evaluate till a string is encountered

8 + 6 * -2 + 4 =0

"0" + (2 + 5) ="0"7

So, we have:

8 + 6 * -2 + 4 + "0" + (2 + 5) = 0"0"7

(c)\ 1 + 1 + "8 - 2" + (8 - 2) + 1 + 1

Evaluate till a string is encountered

1 + 1 = 2

"8 - 2" + (8 - 2) + 1 + 1 = "8 - 2"611

So, we have:

1 + 1 + "8 - 2" + (8 - 2) + 1 + 1 = 2"8 - 2"611

(d)\ 5 + 2 + "(1 + 1)" + 4 + 2 * 3

Evaluate till a string is encountered

5 + 2 =7

"(1 + 1)" + 4 + 2 * 3 = "(1 + 1)"46 --- multiply 2 and 3, then concatenate

So, we have:

5 + 2 + "(1 + 1)" + 4 + 2 * 3= 7"(1 + 1)"46

(e)\ "1" + 2 + 3 + "4" + 5 * 6 + "7" + (8 + 9)

Since a string starts the expression, the whole expression will be concatenated except the multiplication and the expressions in bracket.

So, we have:

"1" + 2 + 3 + "4" + 5 * 6 + "7" + (8 + 9) = "1"23"4"30"7"17

7 0
3 years ago
What role do play in medicine ​
vaieri [72.5K]

Answer: Thus the responsibilities of medicine are threefold: to generate scientific knowledge and to teach it to others; to use the knowledge for the health of an individual or a whole community; and to judge the moral and ethical propriety of each medical act that directly affects another human being

Explanation:

7 0
3 years ago
Other questions:
  • Which string method counts the number of characters in a string?
    5·1 answer
  • What is faster a hi-speed usb port or superspeed usb port?
    13·1 answer
  • Which type of network topology has a central networking device which manages the network and acts as a communications conduit fo
    7·1 answer
  • One of the disadvantages of an e-marketplace is that it cannot provide a single platform for prices. true or false?
    10·2 answers
  • What type of ransomware was developed to block the user from accessing the computer and encrypts all the files on the user's dev
    5·2 answers
  • 5. Which of the following views is used to run a PowerPoint presentation?
    11·2 answers
  • You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which classful subnet mask would you use?A. 255.25
    12·1 answer
  • 01110101<br> +00100100<br> 00010001
    8·1 answer
  • Which type of boot authentciation is more secure?
    10·1 answer
  • How do you get lugia in pokemon alpha saphire
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!