1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VARVARA [1.3K]
4 years ago
5

Crystal detected a problem in a computer network, due to which she could not send or receive data within the network. She pings

computers from the administrator computer. Which problem is she trying to detect?
Computers and Technology
2 answers:
alexgriva [62]4 years ago
8 0
C.(NIC) is the answer for the problem your looking for




babymother [125]4 years ago
3 0
<span>Conflict of IP address in the computers. when computer are networked each computer is given a unique IP address. If two computers have the same IP there will be conflict which lead to failure in sending and receiving data within the network. It can be resolved by checking the IP addresses of each computer and correcting it.</span>
You might be interested in
In the lecture, we saw that TCP waits until it has received three duplicate ACKs before performing a fast retransmit. Why do you
Klio2033 [76]

Answer:

Packets can arrive out of order from the Internet Protocal layer. So,

when out-of-order packets with higher-than-expected sequence number arrives, then gap is detected.

Receiver of an out of order packet would then generate and sends a duplicate acknowledgement (ACK) for already received packet. If retransmission is performed after the first duplicate ACK, it would lead the sender to introduced too many redundant packets in the network.

Hence, TCP designer chose to wait for third acknowledgement (ACK) instead of performing a fast retransmission to avoid redundant packet transmission.

3 0
3 years ago
Integrated circuits are made up of _____ and carry an electrical current
Rasek [7]

Answer:

integrated circuits are made up of Transistor and carry an electrical current

4 0
4 years ago
If(moreDate == true)
worty [1.4K]

it's either C or D I am pretty sure that the answer is D

5 0
3 years ago
A threat actor has successfully breached the network firewall without being detected by the IDS system. What condition describes
Mamont248 [21]

Answer:

false negative

Explanation:

A false negative is a dangerous state in which the IDS (Intrusion Detection System) assumes the activity as acceptable in which the activity is actually an attack occurred on the system.

That means, the Intrusion Detection System has failed to catch the attack. This is the most dangerous state, as the systems were compromised and the network or cyber security people were unable to find the attack.

More generally, there are two types of Intrusion Detection Systems ( IDS ). Network based IDSs ( NIDS ) and Host based IDSs ( HIDS ).

5 0
4 years ago
So, I am homeschooled, and I want to watch videos on my school account because I might be waiting for like emails from my teache
Jobisdone [24]

what web browser

if firefox go to addons and see if you can turn off mkaffee or something like that

or go incogneto

plese give me branliest good luck

3 0
3 years ago
Read 2 more answers
Other questions:
  • While there are many types of sediments, those that make up sedimentary rocks must be transported by running water.
    9·1 answer
  • Which key removes all data from an active cell with one click? A. Esc B. Delete C. Tab D. F2
    9·2 answers
  • In the ____, or ad hoc, layouts configuration, there is no access point at the center of a cell.
    7·1 answer
  • Gus has decided to organize his inbox on June 26th by using folders and deleting irrelevant messages
    10·2 answers
  • Because floating points have decimals, they're more precise and take up more memory than integers.
    6·1 answer
  • The keys to successful outsourcing are accountability, reporting, and ___
    7·1 answer
  • ___________ is a computer programming language.
    9·2 answers
  • In what ways can you sort data by using the sort procedure? Check all that apply.
    6·1 answer
  • Describe what impact your personal vision could have your community or on society​
    6·1 answer
  • Government entities may pressure upstream Internet service providers to _____. a. track and monitor the Internet activities of i
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!