1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Diano4ka-milaya [45]
4 years ago
9

A user can’t log in to the network. She can’t even connect to the Internet over the LAN. Other users in the same area aren’t exp

eriencing any problems. You attempt to log in as this user from your workstation with her username and password and don’t experience any problems. However, you cannot log in with either her username or yours from her workstation. What is a likely cause of the problem?
A. Insufficient rights to access the server
B. A bad patch cable
C. Server down
D. Wrong username and password
Computers and Technology
1 answer:
dmitriy555 [2]4 years ago
5 0
I don’t know if you want me or
You might be interested in
Can I get some help thank you
Reptile [31]
C would be the correct answer I think. Hope this helped
6 0
3 years ago
Read 2 more answers
Clicking a _____ name opens a drop-down list of commands and options. Select one: a. menu b. status bar c. ribbon d. toolbar
Elan Coil [88]

Answer:

menu

Explanation:

https://quizlet.com/231958668/windows-chapter-1-concepts-exam-flash-cards/

7 0
3 years ago
True or False: It is illegal to park in a location that you block or create a hazard for other vehicles.
Feliz [49]
The answer to question is true
5 0
3 years ago
Read 2 more answers
And informative subject line is necessary for a good email true or false​
Yuki888 [10]

True.

A conscise and informative subject line is necessary for a good email. The subject line should give the receiver a good idea what the topic is of the email. An informative subject line also helps the recipient to identify the email as an important message and not spam.

7 0
3 years ago
How computer viruses spread from one computer to another​
morpeh [17]
Viruses spread when the software or documents they get attached to are transferred from one computer to another using a network, a disk, file sharing methods, or through infected e-mail attachments. Some viruses use different stealth strategies to avoid their detection from anti-virus software.
8 0
3 years ago
Other questions:
  • J'Dean is a team lead at a car wash. He wrote a memo to the employees, explaining some upcoming promotions, but J'Dean didn't fu
    6·2 answers
  • Guidelines:
    6·1 answer
  • Write the definition of a function named rotate4ints that is passed four int variables. The function returns nothing but rotates
    9·1 answer
  • Create a class Str that subclasses str. Add a method to the subclass that checks if the string does not start with a given strin
    15·1 answer
  • Access Help defaults to searching for information on the _________.<br><br> Not multiple choice
    10·1 answer
  • Which is a benefit of getting information from a government website?
    15·2 answers
  • How do I delete my brainly account?<br> I don't need anymore.
    13·2 answers
  • In this line of code, what does 144 refer to?
    12·1 answer
  • --------------------------------------------------------------------------------------------------------------------------------
    8·1 answer
  • Write a short program that asks the user to enter a month &amp; prints a message based on the month
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!