1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wariber [46]
3 years ago
8

You are informed that all the users within the network are unable to access the Internet. You decide to start troubleshooting fr

om the Physical layer of the OSI model. Which of the following approaches would you use to troubleshoot this problem?
Random layer approach

Divide and conquer approach

Bottom up approach

Top down approach
Computers and Technology
1 answer:
sveticcg [70]3 years ago
3 0

Answer: Bottom up approach

Explanation:

We should start from the bottom i.e.starting from the physical layer by inspecting the lan, switches, router and also as we move up the level we also need to check the software application and the various routing protocols at each successive levels.

Hence, we use bottom up approach.

You might be interested in
Two different ways to bring up My Computer folder
seraphim [82]
On a Windows PC, My Computer is a folder on the desktop. Alternatively, you can click on Start and access My Computer from that menu.
5 0
3 years ago
You're making great progress on your assignment. You've defined the purpose of your message, identified both the primary and sec
Varvara68 [4.7K]

The most effective way to convey your marketing message is to use the channel and media most used by your potential audience.

To discover the most effective channels and means to reach your audience, market research, online traffic study and other strategies to identify the habits and customs of your target market can be carried out.

A marketing message must be written in a way that engages consumers, creates value and desire for your product or service.

Relationship marketing is a strategy used by companies to create greater proximity and identification of the public with an organization through messages that generate greater value than just advertising, such as the use of blogs, tips, humor elements and other ways to engage the consumer to relate to the company in the language and perspective of the media where the message was conveyed.

The message effectiveness monitoring program is also essential for analyzing the effect of advertising on consumers, through publication traffic, number of visits, hours, number of clicks on the page, etc.

These message tracking programs are effective so that the marketing team can analyze, review and improve their communication through the data and information obtained.

Learn more here:

brainly.com/question/3100288

7 0
3 years ago
1) "Information systems are revolutionizing the way businesses function in the 21st century," Do you agree or disagree with this
alukav5142 [94]

Answer:

true

Explanation:

everything is computerized. banks, shopping, financial business records, ect

7 0
3 years ago
Im trying to do an animation only using simplegui in python and my objective is make the ball enters frame, be confused and jump
viva [34]
The answer is B = 450 because I just know
5 0
2 years ago
​______________________ is a general security term that includes computer​ viruses, worms, and trojan horses.
VashaNatasha [74]
Malware
-------------------
6 0
4 years ago
Other questions:
  • In order to paint a wall that has a number of windows, we want to know its area. Each window has a size of 2 ft by 3 ft. Write a
    12·2 answers
  • To extend the bottom border of a hyperlink across the complete width of a navigation list, change the ____ property of each hype
    9·1 answer
  • Using a wireless network without the network owner's permission is known as ________.
    15·1 answer
  • Name one app that currently has a positive impact on society and explain why you think it has had a positive effect.
    10·1 answer
  • What does the Chart Elements option allow you to change? A. Values B. Color C. Style D. Axis titles
    13·1 answer
  • Describe two types of storage devices?​
    15·1 answer
  • fun fact about London(me): when it comes to relationships she becomes clingy to the person shes dating
    10·1 answer
  • What makes a source credible?
    9·2 answers
  • An opening inside the system unit in which you can install additional equipment can be known as
    13·1 answer
  • Can someone give me an earsketch song of summer to turn in
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!