1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna35 [415]
3 years ago
10

Your company's intranet Web server has crashed. You must help re-create the server. A server administrator has copied a script f

rom last night's backup tape. The server is an exact duplicate of the server that just crashed. However, this script will not process information on the new server. What is most likely the problem on the server?
Computers and Technology
1 answer:
I am Lyosha [343]3 years ago
5 0

Answer:

Executable permissions have not been set correctly.

Explanation:

The most likely problem to the server is that executable permissions have not been set correctly.

Executable permission are set of instructions that tells a server to perform its optimal duty or function.

Copying a script from last night's backup tape is not the only thing to do in the face of trying to recreate a crashed data, one most major thing that will set up the server to become executable is setting its executable permission.

Once this is done, the server will start working optimally.

You might be interested in
Write a program to read a sentence which is a single string. Then count the number of words in the sentence. The program will re
patriot [66]

Answer:

The program in Python is as follows:

sentence = input("Sentence: ")

words = len(sentence.split())

print("Words:", words)

Explanation:

This reads the sentence for the user

sentence = input("Sentence: ")

This counts the number of words

words = len(sentence.split())

This prints the number of words

print("Words:", words)

6 0
3 years ago
Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua
cestrela7 [59]

Answer: Stealth scanning technique

Explanation:

Stealth scanning technique consist of the following types of scans :

1. FIN scan

2. X- MAS tree scan

3. NULL scan

The FIN scan responds by considering port open if response in received for its packet sent with the fin flag else considered closed.

The X-MAS tree scan fires up by setting a  TCP packet with URG, PUSH, FIN flags and the port is considered open if no response.

NULL scans sends null packet and considers it to be an open port.

Stealth scanning techniques considers to get some response from the network with out actually using a handshaking and is used to bypass firewall rules, logging mechanism, and hide themselves as usual network traffic.

3 0
4 years ago
When creating a document template, you can either start from an existing document or begin from _____.
Anna35 [415]
A new blank document
7 0
3 years ago
Write 3 differences between Virtual reality and Augmented reality
nekit [7.7K]

Answer:

In vr you in a vurtial world

7 0
3 years ago
Read 2 more answers
The IV tubing and hub connection site should be left free of tape and uncovered from the dressing so that it can be visually ins
ra1l [238]

Answer:

True

Explanation:

Based on the information provided within the question it can be said that this statement is completely True. The IV tubing and hub need to be easily accessible and able to be visually inspected at all times since all liquids, including medicine enter the patients body through the IV line. Therefore any blockage or error can be life threatening and the problem in the tubing or hub need to be detected immediately and solved, which is why all IV equipment is transparent.

3 0
3 years ago
Other questions:
  • What must you do first in order to change the font type size and colour of a particular text
    13·2 answers
  • What were the advantages and disadvantages of agricultural technology to us.
    12·2 answers
  • Diane wants to maintain a record of percent change in sales from the year 2000 to the present year. She enters the values of per
    10·1 answer
  • Cómo pongo un tomo de llamada SIN PAGAR?
    7·1 answer
  • Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that i
    13·1 answer
  • Help plz technological wuestion
    9·1 answer
  • if you were writing an essay about the major rivers of America which illustration would be the most helpful to your reader ​
    14·1 answer
  • Piers lives in an apartment and has an existing home television connection. He wants to subscribe to a high-speed internet conne
    13·1 answer
  • Bob gets an e-mail addressed from his bank, asking for his user ID and password. He then notices that the e-mail has poor gramma
    6·1 answer
  • How do open online courses help with independent learning
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!