1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksenya-84 [330]
3 years ago
14

Jose calls you at the help desk because he is having a problem logging on to his laptop computer. After several unsuccessful att

empts to enter his password, he asks you to reset the password because he must have forgotten it. You reset his password, and he types it, but again the computer rejects it. Jose assures you that he typed the correct user name and password. You ask him what type of computer he is using, and he tells you a laptop.
Computers and Technology
1 answer:
love history [14]3 years ago
4 0

Answer:

- PC is being rejected by domain

- Caps lock is on

- Not connected to network

Explanation:

You might be interested in
A TCP segment consisting of 1500 bits of data and 160 bits of header is sent to the IP layer, which appends another 160 bits of
Tatiana [17]

Answer:  2140 bits.

Explanation:

In order to traverse the first network, the Data Link Layer builds a frame, which adds a 24-bit header to the IP datagram, which has 1820 bits (1500 bits of TCP data + 160 bits of TCP Header + 160 bits of IP Header).

When the frame arrives to the router that interconnects the two networks, the network layer is informed that the MTU for the destination network, is 800 bits only.

So, as the maximum size for a frame in the destination network must be 800 bits (including the 24-bit header), the IP protocol must fragment the original 1820-bit datagram, in a way that any frame have at a maximum 800 bits.

So the IP datagram is fragmented in 3 datagrams, two of them with 760 bits each (600 from the TCP segment + 160 bits from the IP Header), and a last one, with 620 bits (460 bits from the TCP segment + 160 bits from the IP Header).

All the datagrams are completed adding the 24-bit header to build frames that traverse the destination network until they reach to the final destination.

After stripping the 24-bit header, the frames (that became datagrams), arrive to the network layer protocol, divided in 3 fragments, one of 620 bits and two of 760 bits, with a total of  2140 bits, which, once reassembled, will become the original 1500 bits + 160 bits header of the TCP segment, after stripping the IP headers.

6 0
3 years ago
I was wondering how to give a person a Brainliest answer. Could someone please explain to me the steps on to giving someone a Br
alina1380 [7]
When more than 1 person gives an answer to your question, you receive the option to tick the one you think is more well-explained or thought out in order to make that the Brainliest Answer :)
4 0
3 years ago
BestMed Medical Supplies Corporation sells medical and surgical products
ioda

Management  of the company should adopt a system for unified communications.

<h3>What is unified communications?</h3>

Unified Communications (UC) is a term that connote a kind of a phone system that uses or “unifies” a lot of communication methods within one or the same business.

Note the one's business can be able to communicates in a lot of ways such as  phone calls, video conferencing and as such, Best Med Medical Supplies Corporation  should be considered adopting a system for unified communications.

They should look into:

  • The level of productivity
  • Total costs
  • Compatibility with their business model
  • Productivity.

Learn more about communications from

brainly.com/question/26152499

#SPJ1

3 0
2 years ago
On the pie chart below, which “slice” represents 30% of the budget?
yan [13]

A is the final answer! :)

4 0
3 years ago
You are a very small company that sells healthcare insurance plans. You estimate that the breach of your customer database will
lozanna [386]

Answer:

C. Accept the risk

Explanation:

The first option is close but might not be suitable for a small company considering it's cost.

The second option which is to spend fifty thousand dollars per year on a data loss prevention solution is projected to cost you more than the risk.

The third option isn't specific and lacks a course of action.

6 0
3 years ago
Other questions:
  • 13. What is the suggested rpm on a hard drive for a laptop?
    12·1 answer
  • Which device or software application detects errors in system configurations?
    8·1 answer
  • What does sustainable mean<br>​
    7·1 answer
  • You’re browsing the internet and realize your browser is not responding. Which of the following will allow you to immediately ex
    11·1 answer
  • How do computers read zeroes and ones?
    7·1 answer
  • In the code snippet, what is the “win” part called in programming?
    12·1 answer
  • The ____ option must be used when running a program in order to see the results of assert statements.
    7·1 answer
  • If consumers start to believe they need a product, what is likely to happen
    15·1 answer
  • How to recover deleted photos after deleting from recently deleted
    13·2 answers
  • What can you achieve if you divide your search engine marketing account into relevant campaigns and ad groups?.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!