1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Virty [35]
3 years ago
14

A technician is troubleshooting an employee laptop that has a wired network connectivity issue. The laptop can connect to the in

ternet when used inside the office but cannot connect to the network when used in a research lab. The company uses DHCP in the office but does not use DHCP in the research lab. How can the technician address this issue?A. Cross-talk
B. 568A/568B mismatch
C. Tx/Rx reverse
D. Split pairs
Computers and Technology
1 answer:
defon3 years ago
5 0

By Tx/Rx reverse the technician can address this issue.

C. Tx/Rx reverse

<u>Explanation:</u>

Technician has to trouble the laptop, since the laptop is connected and got internet while is the network resources inside the office. But if he connects the same laptop in research lab end user is not connected

Following troubleshooting to made

1. Routing is done properly

2. Any packet dropping by using TRACE command in windows operating system.

Since DHCP is used in office, whereas same type is not used in research lab. End user can try TX/RX reverse cable to connect in the research laptop.

You might be interested in
You want to get an average of the number of siblings people in a group have. Which data format would be best for you to receive?
never [62]

The data format would be best for you to receive is Spreadsheet.

<h3>What is spreadsheet?</h3>

A spreadsheet is a computer program that allows you to compute, organize, analyze, and store data in tabular form. Spreadsheets were created as electronic counterparts to paper accounting spreadsheets. The software runs on data entered into table cells. Each cell can include numeric or text data, as well as the results of formulas that calculate and display a value dependent on the contents of other cells. One such electronic document may also be referred to as a spreadsheet.

Spreadsheet users can change any recorded value and see how it affects calculated numbers. Because of this, the spreadsheet is ideal for "what-if" analysis because many situations may be studied quickly without human recalculation. Modern spreadsheet software can include numerous interacting sheets and display data as text and numbers or as graphics.

To learn more about spreadsheet visit:

brainly.com/question/8284022

#SPJ4

6 0
2 years ago
Design and implement a structured program for manipulating arrays data structures, as follow:
tekilochka [14]

#include <stdio.h>

struct student {

char firstName[50];

int roll;

float marks;

} s[5];

int main() {

int i;

printf("Enter information of students:\n");

// storing information

for (i = 0; i < 5; ++i) {

s[i].roll = i + 1;

printf("\nFor roll number%d,\n", s[i].roll);

printf("Enter first name: ");

scanf("%s", s[i].firstName);

printf("Enter marks: ");

scanf("%f", &s[i].marks);

}

printf("Displaying Information:\n\n");

// displaying information

for (i = 0; i < 5; ++i) {

printf("\nRoll number: %d\n", i + 1);

printf("First name: ");

puts(s[i].firstName);

printf("Marks: %.1f", s[i].marks);

printf("\n");

}

return 0;

}

#◌⑅⃝●♡⋆♡Nåmřāthā ♡⋆♡●⑅◌

6 0
2 years ago
virtue by which you need to secure information by limiting computer access to authorized personnel only
Natalka [10]
I don't get what you are trying to ask...
Please explain
6 0
3 years ago
"someone has tampered with your computer and erased data". what kind of computer threat is this
pishuonlain [190]
<span>So if some access your computer and erased some data without your permission or knowing then this threat is called as security threat. So you should have these stand alone systems with username and password concept that would protect your sensitive and private data and have the control over your computer.</span>
4 0
3 years ago
Social media sites like stuffdot are often classified based on two factors; self-disclosure and ________
Artist 52 [7]

Answer:

The answer to this question is "Media Richness".

Explanation:

Media Richness is a theory, that says Media has the power to convey the information that is needed in communication. This depends on whether uncertain times which type of data will be used, which is explained by the Mass Communication.  

  • Media Richness is the amount in which two social members make audio, visual and private interaction.
  • It provides face to face communication that was released in 1987 which ranks this as the richest channel for mediated communication.
8 0
3 years ago
Other questions:
  • Which type of communication protocol converts data into standard formats that can be used by applications?
    11·1 answer
  • Fill the validateForm function to check that the phone number contains a number (use the isNaN function) and that the user name
    10·1 answer
  • On which tab are import and export commands located in Access? A. Home B. Database Tools C. External Data D. Create
    13·1 answer
  • What is renewable energy
    13·2 answers
  • PLEASE HELP ANSWER THIS only if you know BOTH ANSWERS!
    9·2 answers
  • After a suspected identity fraud case has been resolved, you should:
    10·2 answers
  • Creating a chart using a spreadsheet Chart Wizard involves four steps. Which is the last step?
    6·1 answer
  • 3.1.5 Which network component connects a device to transmission media and allows the device to send and receive messages?
    6·1 answer
  • You designed a program to create a username using the first three letters from the first name and the first four letters of the
    6·1 answer
  • 1. Write an if statement that assigns 20 to the variable y, and assigns 40 to the variable z
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!