1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Diano4ka-milaya [45]
3 years ago
9

A user can’t log in to the network. She can’t even connect to the Internet over the LAN. Other users in the same area aren’t exp

eriencing any problems. You attempt to log in as this user from your workstation with her username and password and don’t experience any problems. However, you cannot log in with either her username or yours from her workstation. What is a likely cause of the problem?
A. Insufficient rights to access the server
B. A bad patch cable
C. Server down
D. Wrong username and password
Computers and Technology
1 answer:
dmitriy555 [2]3 years ago
5 0
I don’t know if you want me or
You might be interested in
The phrase “I suppose” helps Roosevelt create which kind of tone?
Effectus [21]

Answer:

"i suppose" negative? I'm sorry if it's wrong..

5 0
3 years ago
Read 2 more answers
Consider the following JavaScript program:
dem82 [27]

Answer:

Variable       Where Declared

In Sub1 :

        A        Sub1

        Y        Sub1

        Z        Sub1

        X        Main

In Sub2:

        A        Sub2

        B        Sub2

        Z        Sub2

        Y        Sub1

        X        Main

In Sub3 :

        A        Sub3

        X        Sub3

        W       Sub3

        Y        Main

        Z        Main

Explanation:

In static-scoped languages with nested subprograms, the declaration of a variable is checked with the subprogram, if it is not found, it check within the parent method that called it, it continue until it find a declaration, if no declaration is found, it display an error.

In Sub1, a, y, z is declared there while the declaration of x is found in main.

In Sub2, a, b, z is declared, declaration of y is found in sub1 and declaration of x is found in main.

In Sub3, a, x, w is declared while the declaration of y, z is from the main.

7 0
3 years ago
The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be
coldgirl [10]

Answer:

The answer is "timing".

Explanation:

  • The time attack would be a security vulnerability that enables attackers that identify computer systems or network security issues by analyzing the period of the program's reaction to multiple levels.  
  • It is used in both RSA encryption and decryption of the modular exponentiation method but could be modified for just about any system not seem running in a fixed period.
6 0
3 years ago
Describe the process of terminating a crossover cable​
Zanzabum
Background: In the Information Technology World, the Ethernet cable has been the most trusted medium that is link computers to the world wide web. However, in recent years, wireless technology has limited the use of the Ethernet cable. Nonetheless, true computer geeks know that in order to receive optimum speed within a computer network in a business or inside our homes; the proper cabling technics are crucial when installing a computer network. Therefore, this instructable will provide step-by-step procedures on the proper way to terminate a CAT 6 cable using the TIA 568B standard for a straight-through cable. The procedures used for the straight-through cable can also be utilized to terminate a cross-over and roll-over cable.

Cable Pin-outs: Straight-Through, Cross-over, and Roll-over cables

Step 1: Prepare the cable

Using the cable snips, remove approximately one half inch of outer cable sheath/jacketing from each cable end.

Step 2: Cut cable wires to the appropriate length

Cutting the wires to the proper length allows for the CAT 6 cable to properly fit in the RJ-45 connector.

Step 3: Align cable wires for the specific configuration that will be terminated

The alignment of the wires will ensure they enter the proper channel within the RJ-45 connector when inserting the wires.

Step 4. Slide cable into the RJ-45 Connector

When sliding the cable into the RJ-45 connector, use enough force to ensure the end of the wires are seated firmly at the end of the RJ-45 connector channels.

Step 5. Insert the RJ-45 connector in the crimping tool and Crimp the RJ-45 connector

When inserting the cable into the crimping tool, use enough force to ensure that the cable doesn’t slide out of the crimping tool and the wires do not become misaligned. In addition, while crimping the connector, use enough force to push the copper conductors down on to the wires and the plastic tab on to the outer sheath of the cable. You will hear a click once all the copper tabs are seated properly.

Step 6. Perform a visual inspection of the connector

The visual inspection is to ensure that the connector is properly terminated to the cable. Look for issues with wire alignment and connector looseness.

Step 7. Repeat steps to terminate multiple connectors.
5 0
2 years ago
Which fema mitigation program assists in implementing long-term hazard mitigation measures following presidential disaster decla
julia-pushkina [17]

Answer:

hazard mitigation grant

Explanation:

An emergency will be declared by the head of the state that can be president of the country or mayor of the city if they are unable to handle disasters that can be occurred in near future.

Hazard Mitigation Grant Program is the program that assists the state in implementing long term hazards mitigation measure following presidential declarations. According to the program, Hazard Mitigation Grant Program (HMGP) will provide the funds and assistance to the state to protect public or private properties through safety measures.

8 0
4 years ago
Other questions:
  • Disk scheduling algorithms in operating systems consider only seek distances, because Select one: a. modern disks do not disclos
    13·1 answer
  • A tool that is used to search for and gather data from a page on the internet is called a ?
    11·2 answers
  • How to create json object from variables javascript
    10·1 answer
  • Which flooring option is most economical
    11·1 answer
  • Helpppp plsssss!!!<br><br>thanks.
    7·1 answer
  • What is company NDR?​
    11·1 answer
  • Which of the following is NOT a fall prevention system?
    12·2 answers
  • Evolucion de los sistemas operativos
    5·1 answer
  • Assume that you are working with spreadsheets, word processing documents, presentation slides, images, and sound files for a sch
    15·1 answer
  • What is the function of ROM?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!