1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cerrena [4.2K]
3 years ago
9

Rob calls the help desk to report that he cannot access any websites on the Internet. While he is still on the phone, you have h

im try to access a file on his departmental server. In both cases, his attempts fail. Troubleshoot Rob’s computer and determine why he is unable to access the network. The troubleshooting process will be completed when you are able to access the network using Rob’s computer.
Computers and Technology
1 answer:
kotykmax [81]3 years ago
8 0
In order for Rob to connect to the network,be must check all the connections he has in order to verify if it is physical problem or not. Let Rob check the wires and all the necessary devices like the routers and switches. If its not physical problem then check if the packets have gone out to the different layers of the network.
You might be interested in
Int value[10] = {1, -7, 95, 123, 80, 67, -30, 17, 152, 121} ;
Lorico [155]

Answer:

<u>for loop code:</u>

int total=0;

for(int i=0;i<10;i++)

{

total + = value[i];

}

Explanation:

By declaration we know that the array is of size 10 which means the index will start from 0.

The variable name to be used to store the sum is given as total

We will initialize total with zero so that no garbage value is used.

For loop will be used to access the elements of array and calculate the sum. The syntax of for loop is given as:

for (initialization; condition; increment/decrement)

   {statement}

<u>Code:</u>

int total=0;

for(int i=0;i<10;i++)

{

total + = value[i];

}

8 0
2 years ago
PLEASE HELPPPPP ASAP, 50 POINT'S + BRAINLIEST
vagabundo [1.1K]

Answer:

1. Cybercrimes are online crimes that cause loss of money some examples are: Identity fraud, Cyber bribery, Debit/credit card fr/ud, and Email fr/ud.  

2. In medical offices devices linked to CT scans are able to be h/cked, there is r/nsomw/re that uses their devices. Since medic/l computers are always linked to the internet. it makes it easier for them to be h/cked. They make an employee click on an e-mail carrying m/lw/re, then the cybercrimin/ls encrypt p/tient data then dem/nd p/yment for its decryption.

3. This is a personal question but if you have ever been sc/mmed or witnessed someone being sc/mmed or almost got  sc/mmed it might apply to this question

6 0
3 years ago
Your school has been declared a school of technology
Angelina_Jolie [31]
I don't really understand the meaning of the question. Can you reply and i'll try to help...
7 0
3 years ago
A driver that approaches a controlled intersection with a signal that is not working must:
nalin [4]
You must stop at the intersection and proceed when you are aware that other turning or approaching vehicles,bicycles or pedestrians have stopped.
5 0
3 years ago
Universal Containers (UC) has decided to build a new, highly sensitive application on the Force platform. The security team at U
Tresset [83]

Use an AppExchange product that does fingerprint scanning with native Salesforce Identity  Confirmation

8 0
3 years ago
Other questions:
  • While driving you encounter an emergency vehicle stopped ahead. Discuss how the move over law applies to this situation and your
    13·1 answer
  • What is the voltage drop across R4 in the diagram shown above?
    13·1 answer
  • Which of the following is a rule of thumb for cell phones or smartphone etiquette ?
    12·1 answer
  • What is Napoleon's friend's full name? From the Napoleon Dynamite movie.
    9·2 answers
  • HELP URGENT
    12·2 answers
  • Ideally an entity identifier is composed of _____ attribute(s).
    11·1 answer
  • In your opinion is it more beneficial to have many folders or is it better to nest subfolders
    12·1 answer
  • If two egg cells are fertilized what will happen?
    10·1 answer
  • In the Create Sparkline dialog, the _______ box refers to the cell range where you want the Sparklines to appear.
    9·1 answer
  • Missing appropriate security hardening across any part of the application stack or improperly configured permissions is an examp
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!