1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
leva [86]
3 years ago
8

Almost immediately after a server migration project, employees are complaining that they can't reach the Internet. You sit down

at a machine and try to ping a well-known website using the host name, which fails. You then try to ping a known public IP address, which succeeds. What is most likely the problem?
Computers and Technology
1 answer:
Tcecarenko [31]3 years ago
7 0

Answer:

DNS settings are incorrect.

Explanation:

DNS servers match <em>domain names </em>to their associated<em> IP addresses</em>.

When working properly, if one types a domain name into a browser, computer contacts current DNS server and asks what IP address is associated with the domain name. The computer then connects to the IP address and retrieves the right web page.

You try to ping a well-known website using the host name, which fails. You then try to ping a known public IP address, which succeeds; this means that DNS settings are not correct.

You might be interested in
Real GDP is found by removing the effects of inflation. How is this done mathematically?
tia_tia [17]
<span>B. By dividing Real GDP by (100/100-inflation rate).</span>
3 0
3 years ago
Which function can NOT be performed using the Conditional Formatting option?
Liono4ka [1.6K]

Answer:D is the answer to this one

5 0
3 years ago
Read 2 more answers
Discuss your theory on why the light bulbs in the combination circuit have different brightness.
umka21 [38]
I believe lightbulbs have different brightness because of there quality parts that make it. The cheaper they are usually the worse quality. That is my theory.
5 0
3 years ago
_________________ component defines the correct granularity for access controls and oversees the relationships between identitie
Otrada [13]

Answer:

<u>Authorization</u> component defines the correct granularity for access controls and oversees the relationships between identities, access control rights, and IT resource availability.

Explanation:

Access control is a security technique that verifies the permission that a person or device has to enter an area and to what extent. This function is within the identity and access management of a company. Authorization is the definition of what a specific user can do within an application, that is, to what information and operations they have access, in other words, it refers to the management of access to protected resources and the process of determining whether a user is authorized to access a particular resource. Authorization and access control are ways of enforcing access policies. Authorized persons may access certain resources for their job functions and identify and audit the accesses made.

8 0
2 years ago
An organized file title helps save time locating files, communicates professionalism, and lets us know the file is most likely N
Shkiper50 [21]

An organized file title helps save time locating files, communicates professionalism, and lets us know the file is most likely not a virus: True.

A file can be defined as a computer document or resource which avails an end user the ability to store (record) data as a single unit on the storage device of a computer system.

Generally, all files are identified and organized based on the following criteria:

  • Name (Title).
  • Format (Type).
  • Size.
  • Date.
  • Status.
  • Owner.
  • Permission.

Based on the aforementioned criteria, an organized file title would help to save time locating files, communicates professionalism, and lets us know the file is most likely not a virus because it must have been scanned with an antivirus utility.

Read more: brainly.com/question/23728214

6 0
2 years ago
Other questions:
  • Possible consequences for plagiarism, listed in CAVA's Academic Integrity Policy, may include:
    9·1 answer
  • Which statement best describes a transition in PowerPoint?
    12·1 answer
  • Why is it important to study in a quiet well lit area
    5·2 answers
  • Write a program that repeatedly prompts a user for integer numbers until the user enters 'done'. Once 'done' is entered, print o
    6·1 answer
  • Which of the following is the fastest growing input technique​
    14·1 answer
  • Assignment 4: Evens and Odds<br><br><br> How do I fix this?
    13·1 answer
  • Scenario
    7·1 answer
  • What is the largest value that can be represented by 6 binary digits? .
    5·1 answer
  • Computers rarely make mistakes. True or false
    10·1 answer
  • a functional policy declares an organization's management direction for security in such specific functional areas as email, rem
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!