1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksenya-84 [330]
2 years ago
14

Jose calls you at the help desk because he is having a problem logging on to his laptop computer. After several unsuccessful att

empts to enter his password, he asks you to reset the password because he must have forgotten it. You reset his password, and he types it, but again the computer rejects it. Jose assures you that he typed the correct user name and password. You ask him what type of computer he is using, and he tells you a laptop.
Computers and Technology
1 answer:
love history [14]2 years ago
4 0

Answer:

- PC is being rejected by domain

- Caps lock is on

- Not connected to network

Explanation:

You might be interested in
Explain the term information security?​
Elodia [21]

Answer:

Information security is designed to protect the confidentiality, integrity and availability of computer system data from those with malicious intentions. Confidentiality, integrity and availability are sometimes referred to as the CIA Triad of information security. This triad has evolved into what is commonly termed the Parkerian hexad, which includes confidentiality, possession (or control), integrity, authenticity, availability and utility.

5 0
2 years ago
susan wrote the recursive formula for the sequence represented by the exploit formula An=3+2n. put an C net to any correct state
omeli [17]

The recursive formula of the explicit formula A_n = 3 + 2n is A_n = A_{n-1} + 2

The explicit formula is given as:

A_n = 3 + 2n

When n = 1, we have:

A_1 = 3 + 2(1)

A_1 = 5

When n = 2, we have:

A_2 = 3 + 2(2)

A_2 = 7

When n = 3, we have:

A_3 = 3 + 2(3)

A_3 = 9

So, we have:

A_1 = 5

A_2 = 7

A_3 = 9

Rewrite the functions as follows:

A_1 = 5

A_2 = 5 + 2

A_3 = 7 + 2

So, we have:

A_1 = 5

A_2 = A_1 + 2

A_3 = A_2 + 2

Express 2 as 3 - 1

A_3 = A_{3-1} + 2\\

Substitute n for 3

A_n = A_{n-1} + 2

Hence, the recursive formula is A_n = A_{n-1} + 2

Read more about recursive and explicit formulas at:

brainly.com/question/11235928

7 0
2 years ago
Add Try/Catch error checking To make sure that the user enters valid values in your program. To catch negative values passed to
ryzh [129]

Answer:

int main()

{

 cout<<"Enter the size of array\n";

 int n;

 try{

 cin>>n;//get size of array

 if (n > 0){

 List list;//make object of list class

 try{

     list.init(n);//initialize the list

     list.fillData();//fill the data

     list.print();//print the data

     list.sortData();//sort the  data

     cout<<"\n--- After sorting the data---\n";

     list.print();//print the data

     cout<<"Enter the element to search\n";

     int x;

     cin>>x;//get element to search

     list.searchElement(x);//call the search function

 }

 catch (std::bad_alloc){

   cout<<"Sorry, could not allocate memory for list object.";

 }

 }else{

   throw('Negative Number detected');

 }

 }

 catch (int n){

   cout<<"The number should be a positive integer.";

 }

   return 0;

}

Explanation:

The try and catch keywords come in pairs, as they are used to control exceptions in the C++ source code. The try keyword checks for error in the source code given the condition (if the n integer variable is greater than 0). If the condition is met, the code in the try code block runs otherwise the catch keyword catches the error of a negative number (if the n variable in less than 0).

4 0
2 years ago
. ____________is/are the JSP ImplicitObject(s).sessionapplicationconfigAll of GivenNone of Given
Lynna [10]

Answer:

All of Given

Explanation:

JSP provides a number of implicit objects which are made available by the container and can be used directly in scriptlets. These objects include:

  • session
  • application
  • config
  • out
  • request
  • response
  • pageContext
  • page
  • exception

Example usage:

<% session.setAttribute("userid","demoid"); %>

<% application.getContextPath(); %>

<% out.println(config.getServletName()); %>

5 0
3 years ago
What is the name of the technology that is typically implemented on switches to avoid Ethernet connectivity problems when the wr
Andrew [12]

Answer:  Medium Dependent Interface Crossover (MDIX)

Explanation:

The technology that is typically implemented on switches to avoid Ethernet connectivity problems is Medium Dependent Interface Crossover(MDIX) For switches with Auto (MDIX) the connection is configured automatically and a crossover or straight-through cable can be used to connect two switches. When this MDIX interface is connected it corrects the connectivity speed and the cabling for proper device functionality.

4 0
3 years ago
Other questions:
  • Select all that apply. Hyperlinks can appear as: words pictures symbols trademarks
    12·2 answers
  • Trading your bicycle for a snowboard exemplifies ?
    15·1 answer
  • Assume that the following code exists inside a method of SomeClass, and that this code compiles without errors:
    13·1 answer
  • What is the seventh byte in the roller coasters file?
    12·1 answer
  • Which of the following is the strongest password? Xo795&amp;A &amp;cGo9Tz F5h#3u9g vU7#$3T sC9$d&amp;cF5h#3u9g
    13·2 answers
  • An email message form includes all of the following main areas except
    11·2 answers
  • Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appro
    9·1 answer
  • To prepare a data character for transmission, a ____ bit is added to the beginning of the character and informs the receiver tha
    11·1 answer
  • Please write a Java program to read movies.txt file. (It is in Modules under Chapter Code) Create your own movies.ser file from
    14·1 answer
  • Which of the following was most likely used to apply red background and font to some of the cells in column D?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!