1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vodomira [7]
3 years ago
8

You have configured a group policy preference that creates a VPN connection for all computers in the GPO’s scope. One user says

the connection was there yesterday, but it’s no longer showing in his Network Connections window. You suspect he might have deleted the connection accidentally. What can you do to make sure the VPN connection is re-created even if a user deletes it?
Computers and Technology
1 answer:
Serga [27]3 years ago
3 0

Answer:

In order to make sure that the VPN connection is re-created even if a user delete it, we can:

Disable the option "Apply once and don't re-apply".

Explanation:

GPO:

GPO is known as group policy object that is used to control the user worker experience on a computer. It is a basically a feature of operating system.

  • In our scenario, it is best to disable the apply once and don't re-apply option as this option will recreate the VPN connection if it is deleted accidentally or intentionally.  
You might be interested in
Rebooting a system in an attempt to fix a problem is an example of the ____ problem-solving strategy.
expeople1 [14]
Software trouble shooting
4 0
3 years ago
In this exercise you will debug the code which has been provided in the starter file. The code is intended to take two strings,
vampirchik [111]

Answer:

Here is the corrected program:

import java.util.Scanner; //to accept input from user

public class 02_14_Activity_one { //class name

    public static void main(String[] args) { //start of main method

    Scanner scan = new Scanner(System.in); //creates Scanner class object

  System.out.println("Enter first string"); //prompts user to enter first string

          String s1 = scan.nextLine(); //reads input string from user

  System.out.println("Enter second string"); //prompts user to enter second string

          String s2 = scan.nextLine(); //reads second input string from user

    System.out.println("Enter number of letters from each word"); //enter n

          int n = scan.nextInt(); //reads value of integer n from user

          System.out.println(s1.substring(0,n) + s2.substring(s2.length() - n ));

         } } //uses substring method to print a string made up of the first n letters of s1 and the last n letters of s2.

Explanation:

The errors were:

1.

Scanner scan = Scanner(System.in);

Here new keyword is missing to create object scan of Scanner class.

Corrected statement:

 Scanner scan = new Scanner(System.in);

2.

String s1 = nextLine();  

Here object scan is missing to call nextLine() method of class Scanner

Corrected statement:

String s1 = scan.nextLine();

3.

String s2 = Scanner.nextLine();

Here class is used instead of its object scan to access the method nextLine

Corrected statement:

String s2 = scan.nextLine();

4.

String n = scan.nextLine();

Here n is of type String but n is a whole number so it should be of type int. Also the method nextInt will be used to scan and accept an integer value

Corrected statement:

int n = scan.nextInt();

5.

System.out.println(s1.substring(1,n-1) + s2.substring(s1.length()-n));

This statement is also not correct

Corrected statement:

System.out.println(s1.substring(0,n) + s2.substring(s2.length() - n ));

This works as follows:

s1.substring(0,n) uses substring method to return a new string that is a substring of this s1. The substring begins at the 0th index of s1 and extends to the character at index n.

s2.substring(s2.length() - n ) uses substring method to return a new string that is a substring of this s2. The substring then uses length() method to get the length of s2 and subtracts integer n from it and thus returns the last n characters of s2.

The screenshot of program along with its output is attached.

7 0
3 years ago
Which type of address is used on the Transport Layer of the OSI Model to identify the receiving application?
Marianna [84]

Answer:

Port Number

Explanation:

In the transport Layer of the OSI Model the port number is used to identify the receiving application. Temporary communication sessions are set up that enable data exchange, the two protocols used are Transmission Control Protocol(TCP) and the User Datagram Protocol(UDP) . Each port is assigned a number that identifies it according to its function. The range for some well-known ports is 0-1023.

5 0
3 years ago
ASAP Please Answer Question Within 5 Minutes! OSI is a reference system used by most types of technicians EXCEPT. Answer: Engine
likoan [24]

Answer:

Technical Illustrator do not use ISO reference model in their work. They often use graphical and visual drawing tools of technical illustration in their work. However, Network engineer and computer scientist  often used ISO reference model in their work. As you know that, ISO is a standard for protocol used for communication between two computers.

Explanation:

Technical Illustrator

A technical illustrator makes illustration and visual representation of a product in order to communicate technical information of technical nature with customer/user. The technical illustrator illustrates the technical presentation of the product in manuals and in publication. However, the technical illustrator doesn’t use the ISO model in their work. They use graphical and visual tools to help their work effectively.

Engineer:

Network engineers, communication and internet engineers use the ISO model. For example, if any fault occurs in LAN, to diagnose the fault, the network engineer uses the ISO model to identify the error in ISO layers. They use the ISO conceptual model, in order to know which layer is producing the fault.

Computer Scientists:

The computer scientist who is working in the field of telecommunication, they often use the ISO model as a base, to make improvement in the communication system and management of telecommunication system.

7 0
3 years ago
Read 2 more answers
A household consists of a married couple, their twin three-year-old sons, and their twin eight-year-old daughters. The couple's
Mazyrski [523]
The answer should be B.5

7 0
4 years ago
Read 2 more answers
Other questions:
  • What makes this web page look different from a web page that is not adapted for mobile
    14·1 answer
  • In 2016, NIST published a new Federal Master Cybersecurity Framework to create a mandatory framework for managing cybersecurity
    14·1 answer
  • When you hide a worksheet, its ______ disappears, however the worksheet itself remains part of the workbook until you select to
    8·1 answer
  • g Write a function called price_of_rocks. It has no parameters. In a while loop, get a rock type and a weight from the user. Kee
    13·1 answer
  • Which of the following barriers to oral communication is not the fault of the sender or receiver? being unprepared noise not pay
    12·2 answers
  • What is the maximum number of WildFire® appliances that can be grouped in to a WildFire® appliance cluster?
    7·1 answer
  • Assignment 4: Evens and Odds<br><br><br> How do I fix this?
    13·1 answer
  • 3. Describe at least 3 nonprice competition strategies a company could use to convince customers that its product is better than
    5·2 answers
  • Grade 10 python exercise
    13·1 answer
  • What are the advantages of mine shaft gear and the disadvantaged​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!