1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna35 [415]
3 years ago
10

Your company's intranet Web server has crashed. You must help re-create the server. A server administrator has copied a script f

rom last night's backup tape. The server is an exact duplicate of the server that just crashed. However, this script will not process information on the new server. What is most likely the problem on the server?
Computers and Technology
1 answer:
I am Lyosha [343]3 years ago
5 0

Answer:

Executable permissions have not been set correctly.

Explanation:

The most likely problem to the server is that executable permissions have not been set correctly.

Executable permission are set of instructions that tells a server to perform its optimal duty or function.

Copying a script from last night's backup tape is not the only thing to do in the face of trying to recreate a crashed data, one most major thing that will set up the server to become executable is setting its executable permission.

Once this is done, the server will start working optimally.

You might be interested in
Create the strAnalysis() function that takes 1 string argument and returns a string message. The message will be an analysis of
nydimaria [60]

Answer:

def str_analysis(s):

   if s.isdigit():

       s = int(s)

       if s > 99:

           message = str(s) + " is a pretty big number"

       else:

           message = str(s) + " is a smaller number than expected"

       

   elif s.isalpha():

       message = s + " is all alphabetical characters!"

   else:

           message = "There are multiple character types"

   

   return message;

   

s = input("enter word or integer: ")

while s != "":

   print(str_analysis(s))

   s = input("enter word or integer: ")

Explanation:

- Check if the string is digit, alphabetical, or mixed inside the function

- Ask the user for the input

- Call and print the result of the <em>str_analysis</em> function inside the while loop

- Keep asking for the input until the given string is empty

7 0
4 years ago
What is a characteristic of the network layer in the OSI model allows carrying packets for multiple types of communications amon
Paladinen [302]

Answer:

The correct answer to the following question will be "The capacity to work without reference to the data that would be contained in each bundle".

Explanation:

  • The Layer network governs the activity of the subnet. The main objective of this layer would be to transport data over multiple links from source to destination. When two computers are linked to the same cable, see no need for the network layer.
  • The role of this layer protocols defines the configuration and handling of packets used to transfer information from one to another host.
  • The main purpose of this layer is to allow multiple channels to be intertwined. This is achieved by sending packets to network adapters that depend on algorithms to identify the best directions for the information to move. Such routes are referred to as computer circuits.

Therefore, it would be the right answer.

6 0
3 years ago
Which is a feature of a strong thesis statement?
inessss [21]
A strong thesis statement should answer, but not elaborate on your opinion, or the facts of the central question.
6 0
3 years ago
What is the most significant difference between improving an existing process and designing a new process?
san4es73 [151]

The most significant difference between improving an existing process and designing a new process is that as a person is completely working again on a process or designing a new process, there are known to be a lot of unknowns factors that may occur.

<h3>What is the difference about?</h3>

In working or  redoing a process or designing any kind of new process, there are known to be a lot of unknowns factors.

This is said to be the most significant difference that exist between improving a process and designing a new process. This makes a lot of new processes and products to be very focus on meeting their customer's performance needs or aims.

Learn more about designing from

brainly.com/question/1212088

#SPJ1

5 0
2 years ago
Using the Caesar cipher, "HELLO" is encrypted to "OLSSV" by applying a shift of 7. The number 7 is considered the __________
Semenov [28]

Answer:

The offset

Explanation:

In the question, we understand that the original text is HELLO and the encrypted text is OLSSV.

It should be noted that O replaced H, L replaced E, S replaced L and V replacement O.

This is made possible by a term refered to as offset.

The offset is used to determine the character that will replace another when it is encrypted.

7 characters after H is O; this is same for every other characters in the text.

8 0
3 years ago
Other questions:
  • A private local network, accessible only to an organization's staff, is known as an:
    12·2 answers
  • The computer program that Josh is working on presents him with a sentence in which a word has been underlined. Josh has to indic
    9·1 answer
  • Columns are labeled with letters and Rows are labeled with numbers.
    5·1 answer
  • to edit text boxes in a template, first A click on the text box you want to edit B begin typing C format the front D drag the te
    5·2 answers
  • What is project management? A. Brainstorming ways to plan a project B. Executing, completing, and revising a project C. Managing
    10·1 answer
  • My friend has 200 subs and i have only 36 can you help me its ACYT ZR
    9·2 answers
  • The purpose of __________________ is to isolate the behavior of a given component of software. It is an excellent tool for softw
    13·1 answer
  • List three features of the third generation of computers
    13·1 answer
  • Give an example of an occasion when you used logic to solve a problem
    7·1 answer
  • When proofreading, you should do all of the following except _____.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!