1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AlekseyPX
3 years ago
10

After setting up an Internet connection, you cannot connect to Internet websites, just company intranet sites. What is MOST like

ly
the problem?

Proxy settings

Invalid certificate

Browser cache

Private browsing
Computers and Technology
1 answer:
Masteriza [31]3 years ago
7 0

Answer:Proxy setting

Explanation:

The proxy setting Is where it control the wifi because its connects to the wifi and the router doesn't find the proxy it does not work.

You might be interested in
What is the other name of iterative staatement ​
Mademuasel [1]

Answer:

An loop statement

Explanation:

An iteration statement, loop, repeatedly executes a statement, know as a loop body,until the controlling expression is false

8 0
3 years ago
PLEASE HELP ASAP!!!
Studentka2010 [4]

If you are using CSS :

table {

   border-collapse: collapse;

   border: 5px solid black;

   width: 100%;

}

td {

   width: 50%;

   height: 2em;

   border: 1px solid #ccc;

}

HTML

<table>

   <tbody>

       <tr><td></td><td></td></tr>

       <tr><td></td><td></td></tr>

       <tr><td></td><td></td></tr>

   </tbody>

</table>

for HTML:

<!DOCTYPE html>

<html>

<head>

<meta charset="UTF-8">

<title>Sample table</title>

<style>

table {

   border-collapse: collapse;

   border: 5px solid black;

   width: 100%;

}

td {

   width: 50%;

   height: 2em;

   border: 1px solid #ccc;

}

</style>

</head>

<body>

<table>

   <tbody>

       <tr><td></td><td></td></tr>

       <tr><td></td><td></td></tr>

       <tr><td></td><td></td></tr>

   </tbody>

</table>

</body>

</html>

3 0
3 years ago
Jason is the network manager and is leading a project to deploy a SAN. He is working with the vendor's support technician to pro
ikadub [295]

Answer:

Network diagrams.

Explanation:

In this scenario, Jason is the network manager and is leading a project to deploy a storage area network (SAN). He is working with the vendor's support technician to properly set up and configure the SAN on the network. To begin SAN input and output (I/O) optimization, Jason need to provide the network diagram to the vendor support technician.

A network diagram can be defined as a graphical representation of the topology of a network connection.

Basically, it gives an illustration of all the equipments such as routers, switches, hubs etc.

7 0
3 years ago
Which of the following symbols would not be seen in the syntax for Java variables, methods, or arguments?
Taya2010 [7]

Answer:

??

Explanation:

?? is invalid syntax

When declaring or initializing variables names, and when writing methods, or arguments ?? is not used in Java .

() [] {} all these are used with variables , methods or arguments.

4 0
3 years ago
Programmers refer to a sequence of characters as a ____.
jekas [21]
In programming they know it as a String which is  a sequence of characters that are composed of literal constants or some kind of variables. A sting is any finite sequence of characters. every single string has its own lenght and this is one of the most important characteristics of them. Strings are essential to communicate information from the program to the user. 
5 0
3 years ago
Other questions:
  • What does % find on edhesive??
    14·1 answer
  • A certain computer has a 4meg address space. how many bits wide is this computer's address bus?
    10·1 answer
  • Which statement is used to create a file object that will append data to an existing file? BufferedWriter salesdata =
    7·2 answers
  • Anna is looking for a job. Which two types of skills would she find necessary to secure a job ?
    5·1 answer
  • How do you activate the Formula AutoComplete function of Excel 2016?
    15·2 answers
  • Jack is an accountant. He can't access the spreadsheet software, which is installed on the server. What should Jack do?
    5·2 answers
  • Write a program that does the following:
    11·1 answer
  • Violations of security policies are considered to be a(n) __________ issue upon which proper disciplinary actions must be taken.
    7·1 answer
  • How do you remove management from your chrome book [administrator]
    12·1 answer
  • Your development team is planning to host a development environment on the cloud. This consists of EC2 and RDS instances. This e
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!