1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuri [45]
4 years ago
15

• what command-line utility can you use to assign the correct dns server ip address

Computers and Technology
1 answer:
Lilit [14]4 years ago
5 0
On A Windows machine, you can use the netsh command.
<span>netsh interface ip set dns name="Local Area Connection" static 208.67.222.222

All the steps below means you have access to the router via Telnet or physical access  and it already has a valid configuration (except the DNS)
On a Cisco Router is:
</span><span>Step 1:  <span>enable 
</span></span><span>Step 2: <span>configure <span>terminal 
</span></span></span><span>Step 3: <span>Do one of the following: <span><span>ip domain name name
                                                       </span><span><span>ip domain list </span><span>name
</span></span></span></span></span><span>Step 4 : Device(config)# ip name-server 172.16.1.111 172.16.1.2</span>
You might be interested in
In the Mouse Properties window, you can?
Levart [38]
Answer: option A. adjust the mouse's double-click speed.

You can see it in the attached file.


Download pdf
3 0
4 years ago
While configuring a switch, you noticed a configuration issue with an Ether Channel bundle. You thought you corrected the issue,
liraira [26]

Answer:

Check the ports and ensures that the proper connections are available.

Explanation:

EtherChannel Configuration Guidelines

Before implementing EtherChannel in a network, plan the following steps necessary to make it successful:

1. The first step is to identify the ports that you will use for the EtherChannel on both switches. This task helps identify any issues with previous configurations on the ports and ensures that the proper connections are available.

2. Each interface should have the appropriate protocol identified (PAgP or LACP), have a channel group number to associate all the given interfaces with a port group, and be configured whether negotiation should occur.

3. After the connections are established, make sure that both sides of the EtherChannel have formed and are providing aggregated bandwidth.

4 0
4 years ago
Which is used for making documentation file from microsoft office package​
ratelena [41]

Answer:

the word is use for making docs

5 0
3 years ago
Read 2 more answers
Why is monitoring email, voice mail, and computer files considered legal?
Sati [7]

Explanation:

Monitoring someone's emails,voice mails and computer files is considered is illegal because you are accessing someone's personal information which is not regarded as  ethical .

There are certain reasons where one's email,voice mails and computer files can be monitored are as following:

  1. Protect the security information and security.
  2. Investigation of complaints of harassment.
  3. Preventing personal use of employer's facilities.
6 0
3 years ago
Ms. Troy would like you to make a copy of an outfit that she owns and really likes—a sleeveless dress with a short-sleeve jacket
Contact [7]
3.d
5.c
8.a
9.b
10.b

 just took the exam ... hope it helps

3 0
3 years ago
Read 2 more answers
Other questions:
  • The ____ is designed to placeshift multimedia content; that is, to allow individuals to view their multimedia content at a more
    7·1 answer
  • Which signal types are represented by a continuous wave form?
    11·1 answer
  • The wired or wireless means of connecting a computer to the internet is called a ________.
    9·1 answer
  • Is a set of standards that define how email is to be processed between mail servers is exactly the same as smtp copies an e-mail
    10·1 answer
  • Five differences between monitor and printer
    15·1 answer
  • Create a dictionary that will hold AT LEAST 3 categories for food with at least 3 foods for each category. E.g. Fruits --&gt; Ap
    6·1 answer
  • Study the sentences below. A.Changing the properties of characters in a sentence or paragraph in a Word document helps increase
    5·2 answers
  • You are an online training company and stream a lot of training videos from your
    12·1 answer
  • If a stop-and-wait protocol is used, what is the fraction of time, in seconds, that the sender is busy sending bits into the cha
    8·1 answer
  • Which of the following best explains how devices and information can be susceptible to unauthorized access if weak passwords are
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!