1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dalvyx [7]
3 years ago
14

An employee has contacted the IT Support call center where you work. They are complaining that they are unable to access any web

pages other than the internal intranet site. Which option is the least likely to cause this issue?
a) DNS
b) Firewall
c) Wireless connectivity
d) Proxy server
Computers and Technology
1 answer:
TEA [102]3 years ago
3 0

Answer:

C

Explanation:

Remember the question says LEAST LIKELY. The questions states that internal web servers work but external ones do not. If wireless were the issue nothing would work at all. The issue is more likely to be related to external DNS, a firewall or an issue with the proxy used to connect outside the local network.

You might be interested in
A computer can read whatever you type into it.<br> A)True<br> B)False
motikmotik

Answer:

True

Explanation:

Everything typed into a computer is saved as data and logged.

3 0
3 years ago
Read 2 more answers
What are the steps to configure user information in a document?
chubhunter [2.5K]

Answer:

file, properties, options, general

Explanation:

4 0
2 years ago
Read 2 more answers
On five lane roadways, the center lane is designated for __________ and is used by vehicles traveling in both directions.
Alla [95]
Answer : The center lane is designated for left turns

Explanation: 
This lane is used so that drivers would pull into in order to turn left when a clear merge is available. Its main purpose is not to cause traffic jam while waiting for the chance to turn left. It is illegal to use this lane for any other purposes
5 0
3 years ago
In order to create strong neural networks (connections) in your brain, you've got to __________ the learning process.
sleet_krkn [62]

Answer:

A. Participate actively in

Explanation:

The brain starts to develop even before a child is born and continues into adulthood. During the first few first years of a child's life, neurons, synapses and axon are multiplied to millions. The child's learning process determines the neural connections to be cut off by pruning. An active connection is retained while inactive neurons, synapses and axons are eliminated.

As the child grows, neural connections are strengthened by active participation in the learning process. But when these connections are left idle, they tend to decay.

8 0
3 years ago
SMTP (Simple Mail Transfer Protocol) is the standard protocol for transferring mail between hosts over TCP. A TCP connection is
ruslelena [56]

Answer:

The five rules are described as follows:

Rule A permits the inbound Simple Mail Transfer Protocol (SMTP) connection.

Rule B permits the inbound Simple Mail Transfer Protocol (SMTP) connection.

Rule C permits the outbound Simple Mail Transfer Protocol (SMTP) connection.

Rule D permits the outbound Simple Mail Transfer Protocol (SMTP) connection.

Rule E does not perform any action. Thus it is when the action is denied.

Explanation:

Rule A allows information transfer of the incoming email from the external server to the internal remote server, thus this allows an inbound connection.

Rule B allows information transfer of the incoming email from the remote server to the external remote server, thus this allows an inbound connection.

Rule C allows information transfer of outgoing email from the external server to the internal remote server, thus this allows an outbound connection.

Rule D allows information transfer of the outgoing email from the remote server to the external remote server, thus this allows an outbound connection.

Rule E does not allow any action in either direction thus it is when action is denied.

5 0
2 years ago
Other questions:
  • Select the correct answer.
    8·2 answers
  • which one of these steps describe saving a newly created file. click on the save icon. minimize the file. name the file. select
    12·2 answers
  • Rerouting traffic using arp poisoning is an attack on ________ of a network.
    8·1 answer
  • How to connect xbox one controller
    5·1 answer
  • What type of network access control uses Active Directory to scan a device to verify that it is in compliance?
    11·1 answer
  • Why won't Brainly let me send a link? This is just du*mb! I want to send good articles explaining a content, and this site just
    5·1 answer
  • Deb needs to add borders on the cells and around the table she has inserted into her Word document.
    7·1 answer
  • 1. What are you going to do if someone ask for your personal information online?​
    12·2 answers
  • 1. Give the binary equivalents for the numbers 15, 24, 102?
    5·1 answer
  • How ict tools changed the way we live explain it​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!