1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
leva [86]
3 years ago
8

Almost immediately after a server migration project, employees are complaining that they can't reach the Internet. You sit down

at a machine and try to ping a well-known website using the host name, which fails. You then try to ping a known public IP address, which succeeds. What is most likely the problem?
Computers and Technology
1 answer:
Tcecarenko [31]3 years ago
7 0

Answer:

DNS settings are incorrect.

Explanation:

DNS servers match <em>domain names </em>to their associated<em> IP addresses</em>.

When working properly, if one types a domain name into a browser, computer contacts current DNS server and asks what IP address is associated with the domain name. The computer then connects to the IP address and retrieves the right web page.

You try to ping a well-known website using the host name, which fails. You then try to ping a known public IP address, which succeeds; this means that DNS settings are not correct.

You might be interested in
Can someone please help me...pls.. how do u delete an account on this app(brainly)..pls help fast​
Basile [38]

Explanation:

The option to delete your account can be found in your Profile Settings under Privacy. Click on the box labeled I want to delete my account, and the request will be sent for the account to be deleted.

6 0
3 years ago
Read 2 more answers
Which type of firewall policy calls for a firewall to deny all traffic by default?
charle [14.2K]
Restrictive policy is a kind of policy calls for a firewall to contradict all traffic by default. The first rule denies all traffic on any service and using any port. To permit a specific type of traffic, a new rule must be placed ahead of the deny all rule. A firewall should enforce the overall policy recognized by the network administrator. Enforcement is controlled mainly over setting up packet filtering rules which is a rule base comprises a set of these rules. 
3 0
3 years ago
Make a list of any four computer that were used in the history of computer.​
blondinia [14]

Answer:

ENIAC, UNIVAC, EDVAC and IMB 1401 are the list of computers used in history of computer

Explanation:

hope it helps

plz make it brainliest ans

7 0
3 years ago
When you select an object in the Visual Studio Designer, the object's size, color, text, and other characteristics are displayed
harina [27]

Answer:

the main window if that`s not correct sorry

Explanation:

3 0
3 years ago
What refers to a pleasing arrangement of colors that creates a sense of balance or equilibrium in an image? _____ refers to a pl
Nina [5.8K]

Answer:

The word is " Harmony"

In Art, Harmony is the balance. It is one of the seven principles of Art.

It is the delightful way the  parts are organised, which creates a balanced view, the “Visual equilibrium” .

Harmony is in the music, poem, colours and  even in the  food. Balance give us a pleasant  feeling of equilibrium.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Find a, b, and c<br> A a=4 square root of 6 b= 8 square root of 2 ; c= 4 square root of 2
    12·1 answer
  • Mirrors on cars exist to____.
    7·2 answers
  • Once the data center routes to the destination server that hosts the website, whats the next step in the internet process?
    10·1 answer
  • If none of the contacts of a manual switch change status when the operator is activated, what is the most probable cause?
    9·1 answer
  • To switch from one open document to another, press _____.
    6·1 answer
  • Identify the equation that translates Y = In(x) five units down.​
    8·1 answer
  • In PowerPoint online what can you add to your presentation from the insert tab
    8·2 answers
  • . The electric company charges according to the following rate schedule: 9 cents per kilowatt-hour (kwh) for the first 300 kwh 8
    12·1 answer
  • There are parallels between the trust models in Kerberos and Public Key Infrastructure (PKI). When we compare them side by side,
    15·1 answer
  • MP3 BrainPoP Quiz
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!