1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikklg [1K]
3 years ago
7

A junior network administrator has used the wrong cable type to connect his/her computer to the administrative port on a router

and cannot establish a terminal session with the device. What layer of the Internet model does this problem appear to reside at?a. physical
b. transport
c. network
d. application
e. data link
Computers and Technology
1 answer:
amid [387]3 years ago
3 0

Answer:

a. physical

Explanation:

According to my research on information technology, I can say that based on the information provided within the question the problem appears to reside in the physical layer of the Internet Model. This is because the problem is being caused by the wrong cable being used which cannot provide the function that is needed. Therefore if the physical cable is replaced with the right cable then the problem would be solved.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

You might be interested in
If an online shopping site is experiencing a DDoS attack, what could be a possible impact of the attack?
lidiya [134]

D. A DDoS knocks a webpage offline by spamming the IP with loads of traffic so it over loads the server.

7 0
4 years ago
Who is the first British in Europe ​
Vera_Pavlovna [14]

Answer:

"The British" are people statically from Great Britain in the UK.

7 0
3 years ago
The web development team is having difficulty connecting by ssh to your local web server, and you notice the proper rule is miss
joja [24]

Answer:

Option b (Port 22) seems to the appropriate choice.

Explanation:

<u>Below seem to be some measure you should take to correct this mistake.</u>

  • Verify whether Droplet's host IP address seems to be right.  
  • Verify existing connection supports communication over all the utilized SSH port. Any access points can be able to block port 22 and sometimes customized SSH. For illustration, you could do this by checking different hosts who used the same port, using only a recognized working SSH connection. These could help you identify unless the current problem is not particular to clients' Droplet.
  • Authenticate the Droplet configuration settings. Verify that they're not being configured to DROP 's preferred policy, and do not apply the port to require connectivity.

The SSH server also operates on port 22, by default.  

Other choices don't apply to the specified scenario. So that the argument presented above will be appropriate.

7 0
3 years ago
define the physical components of hardware for a computer system,including identifying internal hardware devices(e.g. processor,
kap26 [50]

Answer:

Explanation:

The necessary hardware components that a computer requires to run properly are the following.

Motherboard, this is the main circuit board that interconnects all of the components and allows them to interact with each other.

CPU, this is the brain of the computer where all calculations and processes are handled.

Video Card, this component handles all the visual data, rendering that the computer needs in order to get a proper image.

RAM, these components are the physical memory where temporary data is stored and used.

Hard Disk, this is the main storage drive where all your data will be saved including the operating system.

PSU, this is the power supply of the unit that distributes the correct amount of power to every other component in the system.

Sound Card, this component handles all the input and ouput audio signals for a computer.

7 0
3 years ago
Write a c program to count the total number of commented characters and words in a c file taking both types of c file comments (
Tanzania [10]

#include<stdio.h>

#include<stdlib.h>

int comment1(FILE *fp)

{

   char ch;

   int count=0;

   while(fscanf(fp,"%c",&ch)!=EOF)

   {

       if(ch=='\n')

       {

           return count;

       }

       count++;

   }

   return count;

}

int comment2(FILE *fp)

{

   char ch;

   int count=0;

   while(fscanf(fp,"%c",&ch)!=EOF)

   {

       if(ch=='*')

       {

           fscanf(fp,"%c",&ch);

           if(ch=='/')

           {

               return count;

           }

           count++;

       }

       count++;

   }

   return 0;

}

int main()

{

   printf("Enter the file name:");

   char s[1000],ch,ch1;

   scanf("%s",s);

   FILE*fp;

   fp = fopen(s,"r");

   int count=0;

   while(fscanf(fp,"%c",&ch)!=EOF)

   {

       if(ch=='\"')

       {

           while(fscanf(fp,"%c",&ch)!=EOF)

           {

               if(ch=='\"')

               {

                   break;

               }

               if(ch=='\\')

               {

                   fscanf(fp,"%c",&ch);

               }

           }

       }

       else if(ch=='/')

       {

           fscanf(fp,"%c",&ch);

           if(ch=='/')

           {

               count += comment1(fp);

           }

           else if(ch=='*')

           {

               count += comment2(fp);

           }

       }

   }

   printf("%d\n",count);

   return 0;    

}

3 0
3 years ago
Read 2 more answers
Other questions:
  • Which type of architecture places a firewall in front of the VPN to protect it from Internet-based attacks as well as behind a f
    6·1 answer
  • What did you include in your response? Check all that
    15·1 answer
  • When you compile your program, the compiler identifies the logic errors and suggests how to correct them?
    14·1 answer
  • A computer is a(n) ____ device, operating under the control of instructions stored in its own memory, that can accept data, proc
    9·1 answer
  • Websites often request information about you. You have a choice as to whether or not you provide this to them. What aspect of PA
    12·1 answer
  • This is important I need help please
    14·1 answer
  • Many inventions have enabled us to use digital cameras. The biggest difference between traditional and digital cameras is that d
    10·1 answer
  • Value of 3.0+4.0×6.0​
    14·1 answer
  • Your iphone is not configured to allow calls using this mac
    10·1 answer
  • A common business practice is to include a worksheet named Documentation that contains a description of the workbook, the name o
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!