1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wariber [46]
2 years ago
8

You are informed that all the users within the network are unable to access the Internet. You decide to start troubleshooting fr

om the Physical layer of the OSI model. Which of the following approaches would you use to troubleshoot this problem?
Random layer approach

Divide and conquer approach

Bottom up approach

Top down approach
Computers and Technology
1 answer:
sveticcg [70]2 years ago
3 0

Answer: Bottom up approach

Explanation:

We should start from the bottom i.e.starting from the physical layer by inspecting the lan, switches, router and also as we move up the level we also need to check the software application and the various routing protocols at each successive levels.

Hence, we use bottom up approach.

You might be interested in
What method of the Math object can be used to return the largest value from the values that are passed to it?
miss Akunina [59]

Answer:

the Math.max() method

Explanation:

The java.lang.* package contains all the essential components needed for a JAVA program which involves numbers and all the operations done on the numericals.

The java.lang.math class contains all the methods needed to perform mathematical operations on numerical values.

All the methods in the question are discussed below with examples.  

Math.max() method

java.lang.Math.max(double/ int/ float a, double/ int/ float b)

This method returns the highest value from among the parameters passed to it.

The syntax for the above is  

Numbers can be integers, float and double or long. The return type is the same as the parameters.

Two values to be compared are passed as arguments and the higher value of them is returned.

This function also accepts negative integers as parameters.

Math.max(-9, -2);

Gives -2 as the output.

Math.max(0.34, 0.45)

Gives 0.45 as the output.

Math.ceil() method

java.lang.Math.ceil(double/ int/ float a)  

This method returns the nearest greater whole number for the given number.

Integer parameter returns an integer number.

Math.ceil(7);

Gives 7 as the output.

Decimal number will return the nearest higher integer.

Math.ceil(8.7);

Gives 9.0 as the output.

Math.ceil(-0.34)

Gives -0 as the output.

Math.pow() method

java.lang.Math.pow(double/ float/ int a, double/ float/ int b)

The above method returns the result of a raise to the power of b.

The first parameter is the base while the second parameter forms the exponent.

Math.pow( 2.3,  4.5 );

This calculates (2.3)^4.5.

Gives 42.44‬ as the output.

Math.pow( 2, 3 );

This calculates the value of 2^3.

Gives 8 as the output.

Math.abs() method  

java.lang.Math.abs(double a)

This method returns non-negative value of the numerical parameter passed to it. Absolute of a number does not changes its value but changes the sign of a negative number. It returns the positive or negation of the negative input number.

Math.abs(-0.1234)

Gives 0.1234 as the output.

Math.abs(12.34)

Gives 12.34 as the output.

These methods require java.lang.Math to be imported in the program.

7 0
3 years ago
1.-  POR QUE LOS HUMANOS NOS INTERESAMOS EN ROBOTS CONASPECTO HUMANO?
oksian1 [2.3K]

Answer:

........

Explanation:

s

6 0
3 years ago
Which of the following is not one of the four methods for classifying the various instances of malware by using the primary trai
BlackZzzverrR [31]

Answer: Source

Explanation: The malware is the software persisting malicious approach to cause the damage/loss.The primary trait of the malware are infection,concealment,etc.

The concealment refer to the malware such as the Trojan horse, and other viruses that has only purpose to cause the malfunctioning in the system.The virus that get into the other software and then damage the system in known as the infectious malware .

The circulation is the transferring of the virus in the circular manner between the system for the damaging.Thus,the only trait that is not the part of the malware is source.

4 0
3 years ago
Name this:<br><br>Software that allows us to create dynamic slide presentations. ​
PtichkaEL [24]
I think it is presentation
4 0
3 years ago
What is the education level of a majority of the Power, Structural, and Technical Systems workers?
Anton [14]

The answer to the question stated above is the second option, bachelor’s degree or apprenticeship.

The education level of a majority of the Power, Structural, and Technical Systems workers is <span>bachelor’s degree or apprenticeship but, a bachelor's degree is the minimum.</span>

4 0
2 years ago
Other questions:
  • A local area network works as a ____ network in that clusters of workstations are connected to a central point (hub or switch) t
    6·1 answer
  • Frank is a writer. He needs to work for long hours and type for long periods on the computer. What injury can Frank develop?
    15·2 answers
  • List the names of 3 computer scientists
    6·2 answers
  • Boardman College maintains two files—one for Sociology majors and another for Anthropology majors. Each file contains students'
    5·1 answer
  • Name two materials that we can burn in order to get energy from biomass
    9·1 answer
  • How to improve a poor game design puzzles
    11·1 answer
  • The sun can be an excellent source of natural light.<br> True.<br> False.
    8·2 answers
  • Could anyone help me with this assignment please?
    6·1 answer
  • Which factor affects reading speed the most?
    9·1 answer
  • What is the official name of an application on a desktop or a laptop?.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!