1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vera_Pavlovna [14]
3 years ago
5

You share a number of files from your computer, and you've received a number of calls from users who say they can't connect to t

he files. You check your computer and find that the Ethernet cable is unplugged. You've plugged the Ethernet cable in, so now you need to start the network interface card. In this lab, your task is to: Determine which network interface went down when it was unplugged. Start the network interface from the command line.
Computers and Technology
1 answer:
zmey [24]3 years ago
4 0

Answer:

ifconfig p2s1 down ifdown enp2s1 ip link set enp2s1 down

Explanation:

It can be used to enable or disable a network port interface in Linux. It involves 5 methods which are.

A.) ifconfig command. Is adopted in configuring a network interface, it gives info about NIC

B.) ifdown/if up command. Used to bring down or bring up a network interface.

C.) ip command. Used in managing NIC

D.) nmc1i command

It is a line tool that controls network manager and is also used in describing the status of a network.

E.) nmtui command

You might be interested in
What is an audit trail?
rewona [7]

Answer:

poop

Explanation:

poop

3 0
3 years ago
Read 2 more answers
Betty is applying for a software analyst role. which field should she specialize in? information technology resource management
Schach [20]
Since Betty is applying for a software analyst role, she should specialize in INFORMATION TECHNOLOGY.

<span>Information technology or IT is defined as the study or use of systems in computers and telecommunications for storing, retrieving, and sending information.
</span>
Betty's role as a software analyst  would be to:
1) <span> study the </span>software<span> application domain,
2) prepare </span>software<span> requirements and specification (</span>Software<span> Requirements Specification) documents.
3) be the link between the software users and software developers.</span>
5 0
3 years ago
Read 2 more answers
Which of the following scan only works if operating system’s TCP/IP implementation is based on RFC 793?
Shkiper50 [21]

Answer:NULL Scan

Explanation:RFC 793(Request for comments) is a type of RFC command labeled with the number 793 which can operate with the TCP protocol.They are sort of document form which is from IETF( Internet Engineering Task Force ).

The null scan is scanning protocol used by legal as well as illegal hackers for working in the transfer control protocol architecture. It is used for the identification of the the ports and holes in TCP servers.they can also have the negative impact if used by the illegal hackers.

5 0
3 years ago
The small, touch-sensitive area at the base of the keyboard on a notebook computer is known as a ________.
USPshnik [31]
Trackpad.

(Sheep sheep mr sheep meep)
8 0
4 years ago
Read 2 more answers
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
Other questions:
  • When does a kernel panic occur?
    12·2 answers
  • Give an example of a language L such that |L|=5 and |L^2|=16.
    5·1 answer
  • Examine the following algorithm.
    9·1 answer
  • Why do people still use Intel HD graphics for gaming?
    8·1 answer
  • Both UDP and TCP use port numbers to identify the destination entity when delivering a message. Give at least one reason for why
    12·1 answer
  • Update thejavafile names to include your initials at the end, send .java file only.1. Completein-place heapSort, which takes an
    11·1 answer
  • Help me asap ill give brainliest
    8·1 answer
  • If you want to join all of the rows in the first table of a SELECT statement with just the matched rows in a second table, you u
    10·1 answer
  • Higher Order Functions used for simulations of dice rolls. Definition: An n-sided dice function takes no arguments and always re
    12·1 answer
  • 5 differences between a regular mouse and a gaming mouse​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!