1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Virty [35]
4 years ago
14

A technician is troubleshooting an employee laptop that has a wired network connectivity issue. The laptop can connect to the in

ternet when used inside the office but cannot connect to the network when used in a research lab. The company uses DHCP in the office but does not use DHCP in the research lab. How can the technician address this issue?A. Cross-talk
B. 568A/568B mismatch
C. Tx/Rx reverse
D. Split pairs
Computers and Technology
1 answer:
defon4 years ago
5 0

By Tx/Rx reverse the technician can address this issue.

C. Tx/Rx reverse

<u>Explanation:</u>

Technician has to trouble the laptop, since the laptop is connected and got internet while is the network resources inside the office. But if he connects the same laptop in research lab end user is not connected

Following troubleshooting to made

1. Routing is done properly

2. Any packet dropping by using TRACE command in windows operating system.

Since DHCP is used in office, whereas same type is not used in research lab. End user can try TX/RX reverse cable to connect in the research laptop.

You might be interested in
Mga halimbawa ng migrasyon​
DENIUS [597]

kung ito ay sa araling panlipunan,

1. Emigrante/Emigrant- mga taong paalis sakanilang bayan upang manirahan sa ibang bansa(umaalis ng bansa).

2. Imigrante/Immigrant- mga taong nagsisimulang itaguyod ang kanilang pamumuhay sa ibang bansa (pumapasom sa ibang bansa).

3. Irregular Immigrants- ay mga mamamayan na nagtungo sa ibang bansa na hindi dokumentado, walang permit para magtrabaho at sinasabing overstaying sa ibang bansa pinuntahan.

4. Temporary Migrant- ang tawag sa mga mamamayan na nagtungo sa ibang bansa na may kaukulang permiso at papeles upang manirahan nang may takdang panahon.

5. Permanent Migrants- ay mga overseas (Filipinos) na ang layunin ay hindi lamang trabaho kundi permanente na paninirahan sa piniling bansa.

6. Flow- tumutukoy sa dami o bilang ng mga nandarayuhang pumapasok sa isang bansa sa isang takdang panahon na kadalasan ay kada taon.

Explanation:

Di ako sure kung yan ang hanap mo or science.

5 0
3 years ago
Which of the following is necessary to effectively navigate online?. A. You must be able to identify important questions. B. You
Anon25 [30]
The one that is necessary to effectively navigate online is : D. All of the above

Important questions are identified to find out the troubles that the online seeker needed, ability to communicate information is used to put the actual content, the analysis and information synthesizing is used for coding

hope this helps
6 0
3 years ago
Assume passwords are selected from four character combinations of 26 lower case alphabetic characters. Assume an adversary is ab
finlep [7]

Answer:

Given:

Passwords are selected from 4 characters.

Character combinations are 26 lower case alphabetic characters.

Passwords attempts by adversary is at rate of 1 second.

To find:

Expected time to discover the correct password

Explanation:

Solution:

4 character combinations of 26 alphabetic characters at the rate of one attempt at every 1 second = 26 * 4 = 104

So 104 seconds is the time to discover the correct password. However this is the worst case scenario when adversary has to go through every possible combination. An average time or expected time to discover the correct password is:

13 * 4 = 52

You can also write it as 104 / 2 = 52 to discover the correct password. This is when at least half of the password attempts seem to be correct.

3 0
3 years ago
____ are likely in the event of a hacker attack, when the attacker retreats to a chat room and describes in specific detail to h
Masja [62]

Answer:

Follow-on incidents.

Explanation:

When the hacker hacks something successfully and after that when he or she  discusses or describes the details to his or her associates and the method which he or she used to do the hacking is called Follow-on incidents because the hacker has successfully completed his or her conquest the event is happening after that.

4 0
4 years ago
How many mb are in a gb?
frosja888 [35]

Answer:

1000 megabytes are in a gigabyte

Explanation:

3 0
3 years ago
Other questions:
  • What is heaven backwards?
    11·2 answers
  • What are three reasons teens might start drinking alcohol??
    7·2 answers
  • Which of the following is similar to defense in depth and supports multiple layers of security?a. Defense in depthb. Diversity o
    7·1 answer
  • A new systems development project is Pete’s first experience as a project manager, and he has led his team successfully to the p
    13·1 answer
  • True or false A job analysis weight the positives and negative of a given career
    13·1 answer
  • Write a C program to find the sum of 10 non-negative numbers entered by user​
    14·1 answer
  • Name the factors which of the following resources relate to :
    7·1 answer
  • You need to select the text / picture /shape before you can Hyperlink.
    9·1 answer
  • Selling emojis that you dont have
    6·1 answer
  • When using a self-contained recovery device on a cfc, hcfc, or hfc system with an operating compressor, technicians must?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!