1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Diano4ka-milaya [45]
3 years ago
9

A user can’t log in to the network. She can’t even connect to the Internet over the LAN. Other users in the same area aren’t exp

eriencing any problems. You attempt to log in as this user from your workstation with her username and password and don’t experience any problems. However, you cannot log in with either her username or yours from her workstation. What is a likely cause of the problem?
A. Insufficient rights to access the server
B. A bad patch cable
C. Server down
D. Wrong username and password
Computers and Technology
1 answer:
dmitriy555 [2]3 years ago
5 0
I don’t know if you want me or
You might be interested in
question 7 packages installed in rstudio are called from cran. cran is an online archive with r packages and other r-related res
Ksenya-84 [330]

Packages installed in rstudio are called from cran. cran is an online archive with r packages and other r-related resources, is the true statement.

<h3>What are CRAN packages in R?</h3>

It comprises archives for both the most recent and prior versions of the R distribution, donated R packages, and documentation. It provides both source packages and pre-compiled binaries for Windows and macOS. there are more than 16,000 bundles available.

The version of R that is made available through CRAN is compatible with the integrated development environment for R, referred to as RStudio. All of the major systems support RStudio, which includes a variety of tools that boost productivity.

Thus, it is the true statement.

For more information about CRAN packages in R, click here:

brainly.com/question/10658169

#SPJ1

7 0
1 year ago
¿ Porque la madera presenta mayor resistencia a ser cortada en sentido travesal que en sentido longitudinal
ozzi
A medida que crece un árbol, la mayoría de las células de madera se alinean con el eje del tronco, la rama o la raíz. Estas células están compuestas por haces largos y delgados de fibras, aproximadamente 100 veces más largas que anchas. Esto es lo que le da a la madera su dirección de grano.

La madera es más fuerte en la dirección paralela al grano. Debido a esto, las propiedades de resistencia y rigidez de los paneles estructurales de madera son mayores en la dirección paralela al eje de resistencia que perpendicular a él
5 0
3 years ago
The term ____ refers to a wide variety of different database technologies that were developed in order to overcome some of the l
ella [17]
Database management systems are used to store and to access information.
In <span>the Relational Database Management System </span>(RDBMS), all the data is in the form of simple columns and rows in a table. Structured Query Language (SQL) is is the standard query language for RDBMS. Some of the disadvantages of RDBMS are: not enough storage area to handle data such as images, digital and audio/video, do not provide good support for nested structures,not much efficient and effective integrated support.
<span>The term object oriented database management systems (OODBMS)  refers to a wide variety of different database technologies that were developed in order to overcome some of the limitations of relational databases.</span>





5 0
4 years ago
According to shared security model, which two are a customer's responsibilities in Oracle Cloud Infrastructure (OCI)?
sashaice [31]

Answer:

According to shared security model, a customer's responsibilities in Oracle Cloud Infrastructure (OCI) are:

1. Workloads security: The customer is responsible for protecting the work function or a distinct capacity, like a Hadoop node, a Web server, a database, or a container, that it puts on the cloud.

2. Services configuration:  The customer is also responsible for securing the specifications that describe the different aspects of its managed service.

Explanation:

Responsibilities are shared between Oracle and the customers using the Oracle Cloud Infrastructure (OCI).  Oracle is solely responsible for the security of the underlying cloud infrastructure (such as data-center facilities, hardware, and software systems), while the customer is responsible for securing the workloads and configuring their services to suit their individual needs.

8 0
3 years ago
The company that you work for has recently had a security breech. During the recover and assessment, it was discovered that the
mars1129 [50]

Answer:

I recommend Digital Certification of User through trusted certification Authority, who is requesting to access the company website through VPN to make sure the identity of the user.

Explanation:

Digital Certificate is the type of identity key or certificate that is assigned to the users as per their request. It is a unique number that is assigned to the user to ensure the authentication that Who are you. It is same like our identity card number that shows our identity to someone as per requirement.

These certificates are issued by certification organizations that are registered or trusted. If the users are using VPN on their devices to access some website that may not be a trusted user or a malware that can hurt the company by breaching the security protocols. So, some companies didn't allow untrusted users to websites.

<em>Therefore, I recommend to my company that, they should ensure that the users that are trying to access the website through VPN must have some digital Certificate from trusted certification authority to ensure the identity of the users.</em>

<em />

6 0
4 years ago
Other questions:
  • What are two distinctive types of unmanned aircraft systems
    11·1 answer
  • Add is a function that accepts two int parameters and returns their sum.
    8·1 answer
  • When a workforce scheduling problems is formulated as an integer programming model, it has:?
    6·1 answer
  • 5. RAM IS YOUR SYSTEM’S-
    14·2 answers
  • Jim has just purchased two new SCSI hard disk drives and a controller card for them. He properly installs the hardware in his ma
    7·1 answer
  • Create the following SQL Server queries that access the Northwind database. Place them in a zip file and place the zip file in t
    6·1 answer
  • Note oj cyber security​
    6·1 answer
  • While using a web-based order form, an attacker enters an unusually large value in the Quantity field. The value he or she enter
    15·1 answer
  • Differentiate between refraction of light and reflection of light
    8·2 answers
  • Describe how you will lunch a web browser using the start menu​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!