1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blagie [28]
4 years ago
12

You are informed that all the users within the network are unable to access the Internet. You decide to start troubleshooting fr

om the Physical layer of the OSI model. Which of the following approaches would you use to troubleshoot this problem?a. Random layer approachb. Divide and conquer approachc. Bottom up approachd. Top down approach
Computers and Technology
1 answer:
jok3333 [9.3K]4 years ago
3 0

Answer:

C. Bottom-up approach will be used in this scenario.

Explanation:

The OSI or Open Systems Interconnection is an architecture that comprises of seven (7) layers, each layer unique in its functionality. The layer is listed below:

7. Application layer

6. Presentation layer

5. Session layer

4. Transport layer

3. Network layer

2. Data link layer

1. Physical layer

Layer 1 - 3 are considered the hardware layers, Layer 4 is considered as the heart of the OSI model while layers 5 - 7 are considered the software layers.

Back to our question, once you decide to troubleshoot from the physical layer of the OSI model, you are troubleshooting this problem from a bottom-up approach.

You might be interested in
Mark handles the accreditation of applications and systems within his department. He has been told by one of his technicians tha
lorasvet [3.4K]

Answer:

Changes took place

Explanation:

The system changes took place that needs to be re-accredited because, in his department, Mark performs certification of software and computer systems. Some of several specialists have advised him a device needs to be properly-accredited.

So, the system changes have taken place and need to be actually-accredited.

7 0
3 years ago
Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create
lara31 [8.8K]

Answer:

1: Word Processor

2: Graphics Software

3: Mail Merge

Explanation:

Given

1. Create a list of invitees

2. Design an invitation card

3. Personalize the card

Creating a list of invitees is a task that requires basic activities such as typing, using of numbers and bullets; these activities can be achieved using word processing software programs such as Microsoft Word, WordPerfect, amongst others.

<em>So task 1 requires a word processor</em>

An invitation card is a piece of graphics that can be perfectly handled by graphics software programs such as CorelDraw, Adobe Photoshop, etc.

<em>So task 1 requires a graphics software</em>

Task 3 can be achieved using mail merge and this is because mail merge can be used either to print or to mail recipients. While mailing the recipients, one can easily personalize each letter (or in this case, an invitation card) to suit the recipient it is being directed to.

5 0
3 years ago
1. It is one way to attain one's holistic health condition.​
suter [353]

Answer:

It focuses on complete human body condition rather than single parts. The person should be healthy in all dimensions.

Explanation:

Holistic health condition is an ancient approach to a healthy life. This is a study where human is considered as healthy if he has no illness plus he is able to interact with others. he healthy condition depicts mind, soul and body. The health conditions are based on dimensions rather than single body function.

3 0
3 years ago
Discuss the use of distributed (federated) authentication systems in use at your institution. If no such system is in use, then
aleksklad [387]

Answer:

Check the explanation

Explanation:

Distributed (federated) authentication system:

  1. • Federal identity in a information technology is a process of linking a person's identity and the attributes in multiple distinct identity management system.
  2. • It uses a single sign-on authentication; it means that one authentication credential is used to access multiple applications or the accounts.

Use of distributed (federated) authentication systems in institutions

In the institution the educational resources and other splices are offered via online, the faculty, students, alumni or other users using are accessing the resources from the various locations.

Different devices like mobile, tablet, laptop, desktop are used to access those resources.

The distributed or federated authentication identity management permits the institution to provide the access in a trustworthy, protected manner without n explosion a credentials.

• She distributed or federated authentication identity management permits the institution or individual faculty to control the access of research or other data easily and enables new level of academic collaboration

• It support the institutional policies to emend the access of valuable resources to a specific groups a use, and the incorporation of identity management across the academic government and commercial add and it make wider the possibility for interdisciplinary, inter-institutional scholarship.

BENEFITS

Students

• Make them to remember to single user id and password.

• Makes to access the educational resources across the institution and world.

• Personal information's are securely protected.

Teachers and Researchers

• flaps to create learning and research tools.

• It makes the control to access the restricted crown .

• It follows the Federal regulations and streamlines the access to the federal grant system

IT

• It eliminate the data and system redundancy

• Provides a strong and secure identity and access management.

4 0
4 years ago
Paano nakatutulong ang teknolohiyang pangkomunikasyon sa pangangalap ng impormsyon
Makovka662 [10]

Answer:

Yes correct. Absolutely breathtaking. You should create poetry with your writing skills.

6 0
3 years ago
Other questions:
  • Which javascript method should you use if you want to specify a message string to appear on your web page as it loads?
    13·1 answer
  • What do you think of explaining to young people, from high school, the legitimacy of copyright and the dangers they can run on t
    11·1 answer
  • Which VMware product would allow administrators, to manage enterprise desktops with increased reliability, security, end-user ha
    11·1 answer
  • Signs that a listener is paying attention include:
    10·2 answers
  • 10^4+10-2=<br>10^4+10-2=
    12·2 answers
  • What is the typical educational requirement for a non-entry level software programmer? high school diploma technical certificate
    10·1 answer
  • 3) Prompt the user for a 3-digit number, and the output should be the magical #, which is formed with each digit shifted to the
    13·1 answer
  • What is node ? Briefly explain with diagram<br><br>​
    8·1 answer
  • Match the roles to the task they perform.
    5·1 answer
  • iv. Assuming the above operating system that cannot perform memory deallocation. Name at least three effects on the overall syst
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!