1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wariber [46]
3 years ago
8

You are informed that all the users within the network are unable to access the Internet. You decide to start troubleshooting fr

om the Physical layer of the OSI model. Which of the following approaches would you use to troubleshoot this problem?
Random layer approach

Divide and conquer approach

Bottom up approach

Top down approach
Computers and Technology
1 answer:
sveticcg [70]3 years ago
3 0

Answer: Bottom up approach

Explanation:

We should start from the bottom i.e.starting from the physical layer by inspecting the lan, switches, router and also as we move up the level we also need to check the software application and the various routing protocols at each successive levels.

Hence, we use bottom up approach.

You might be interested in
The best way to safeguard your document is to save it
givi [52]
The answer is C every few minutes
8 0
3 years ago
Data-driven decision making is a process of <br><br>    
ANTONII [103]

It is a process of making decisions that are backed up with verifiable or hard data rather than making decisions based on observation only. In the past few years, it used to be a difficult process to collect, extract and analyze data. These days, however, the development of business intelligence software allows anyone without a heavy IT background to produce reports that will later need to be analyzed, <span>thus accelerating the decision process.</span>

3 0
3 years ago
Which of the following applies to a trademark?
Lemur [1.5K]

Answer:

a

Explanation:

4 0
3 years ago
Under which access control system is each piece of information and every system resource (files, devices, networks, and so on) l
Pani-rosa [81]

Answer:

C. Mandatory access control

Explanation:

In the implementation of computer security, the mandatory access control (MAC) refers to the implementation of a security feature by operating systems. In this method, individual resource owners’ are unable to deny or grant permissions to a resources contained in a file. The criteria in a MAC when defined by the system administrator is implemented and enforced by the OS.

7 0
3 years ago
Describe a situation in a program where you could write and use a "for loop".​
kykrilka [37]

Answer:

  • Use the one that reads most clearly.
  • If you can’t decide, just pick one.
  • If you can’t then use for()
  • If at any point later in time you change your mind, refactor your code.

This is how professionals work. Decide, and for all things with low impact to change, don’t sweat it.

Save that for architectural and API design choices.

Answer#2:

  • Well if you are looking for a simple technique to choose which loop to use you can use these rules.
  • Use for loops when there's a sequence of elements that you want to iterate.
  • Use while loops when you want to repeat an action until a condition changes.

And if whatever you are trying to do can be done with either for or while loops then just choose your favourite :)

8 0
2 years ago
Read 2 more answers
Other questions:
  • In a word processing program, the ribbon or menus contain the
    12·1 answer
  • After brainstorming engineers may refine their ideas by making
    8·1 answer
  • The process of _____ determines what volume a system can handle by comparing its performance to standards in the industry.
    7·1 answer
  • Which charges a fee for access to read, research, or copy articles and other published materials?
    11·1 answer
  • Assign courseStudent's name with Smith, age with 20, and ID with 9999. Use the PrintAll member function and a separate cout stat
    14·2 answers
  • Consider the scenario below. Will the solution attempted by the technician fix the problem or make it worse? Defend your answer.
    5·1 answer
  • Think of an aspect of HTML that you found challenging to master. Why is that aspect of HTML important? What are some future situ
    6·1 answer
  • A company is deploying NAFDs in its office to improve employee productivity when dealing with paperwork. Which of the following
    11·1 answer
  • Explain why the computer is powerful working tool???​
    7·1 answer
  • What can visible light and ultraviolet light do together
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!