1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klemol [59]
3 years ago
9

A technician is troubleshooting a computer that will not communicate with any hosts on the local network. While performing a vis

ual inspection of the system, the technician notices no lights are lit on the computer's wired NIC."Which of the following are possible steps the technician should take to resolve this issue? (Select TWO.)
a. Check for APIPA assignment on the computer.
b. Ping the default gateway router. (this one is wrong)
c. Verify the NIC is enabled in system BIOS.
d. Verify the NIC is connected to the keystone jack. (this one is right)
e. Verify the network patch cable is wired as T568A.
Computers and Technology
1 answer:
tangare [24]3 years ago
8 0

Answer:

Assuming that D is correct, the other answer is C.

Explanation:

<em>I used Dell Support to confirm this.</em>

It states that if the lights are off, it is not detecting the network and no connection is in place. You would want to confirm the NIC is enabled in the BIOS (as C states).

I hope this helps!

You might be interested in
Witch of the following attributes of a website indicates a more reliable source for information
Arada [10]
The only one of those I would trust is the site ending with EDU I hope this helps you.
4 0
3 years ago
Write a program to assist a cashier with determining correct change. The program should have one input, the number of cents to r
SCORPION-xisa [38]
```
#!/usr/local/bin/python3

import sys

coins = { "quarters" : 25, "dimes" : 10, "nickels" : 5, "pennies" : 1 }

def mkChange( balance, coin ):
    qty = balance // coins[ coin ]
    if( qty ):
        print( str( qty ) + ' ' + coin )
    return( balance % coins[ coin ] )

if( __name__ == "__main__" ):
    if( len( sys.argv ) == 2 ):
        balance = int( sys.argv[ 1 ] )
        balance = mkChange( balance, "quarters" )
        balance = mkChange( balance, "dimes" )
        balance = mkChange( balance, "nickels" )
        balance = mkChange( balance, "pennies" )
    else:
        sys.stderr.write( "\nusage: " + sys.argv[ 0 ] + " <change owed>\n" )
```


5 0
3 years ago
Which of the following is a basic principle of improvement?
lesya [120]

From the given the statement, "every system is perfectly designed to get the results it gets" is a basic principle of improvement.

Option B

<u>Explanation:</u>

The improvement activity begins with the quote ‘every system is perfectly designed to get the results it gets’, by W. Edwards Deming; The quote states both the unintended and intended effects are designed into our systems.

For example: Healthcare in the UK has been perfectly designed to lower the waiting times to 18 weeks for various procedures over last twelve years. Reflecting on Safer Patients Initiative (SPI), this can be true to improvement systems: every improvement system is perfectly designed to get the results its gets and SPI is a case in point.

The leading improvements that need to be designed into our improvement systems:

  • Improvement activity needs to be built on strong foundations
  • Greater engagement with people’s intrinsic motivation
  • Embrace a wider set of methods
  • Greater understanding of how systems and processes outside direct clinical care contribute to safety and quality.

So, it can be concluded that the line given by W. Edwards Deming tends to be the principle of improvement.

6 0
3 years ago
When correctly implemented, what is the only cryptosystem known to be unbreakable?
Leona [35]

When accurately executed, the only cryptosystem known to be unbreakable is called: "One-time Pad" (Option D)

<h3>What is a Crypto System?</h3>

The one-time pad is a cryptographic approach that cannot be broken but needs the usage of a single-use pre-shared key that is not less than the message being delivered. A plaintext is coupled with a unique secret key in this manner.

It should be emphasized that in cryptography, a cryptosystem is a collection of cryptographic algorithms that are required to perform a certain security function, such as confidentiality. A cryptosystem is often composed of three algorithms: one just for key generation, one for encrypting, and one for deciphering.

Learn more about Crypto System:
brainly.com/question/15084188
#SPJ1

Full Question:

When correctly implemented, what is the only cryptosystem known to be unbreakable?

A) Transposition cipher

B) Substitution cipher

C) Advanced Encryption Standard

D) One-time Pad

6 0
1 year ago
In 1–2 sentences, describe how you would create a border around a group of cells
iragen [17]
Pick one of the cells you<span> want to format and then click the down arrow beside the </span>Borders<span> button in the Font </span>group<span> on the Home tab. A drop-down menu comes up with all the</span>border<span> options that </span>you can<span> apply to the </span>cell<span> selection</span>
4 0
3 years ago
Read 2 more answers
Other questions:
  • The keyboard, mouse, trackpad, microphone, light pen, and voice recognition are examples of _____ devices.
    5·1 answer
  • Suppose you use Batch Gradient Descent to train a neural network and you plot the training error at every epoch. If you notice t
    7·1 answer
  • All of the following are aspects of the search process except?
    5·2 answers
  • What is the purpose of a mutator?
    8·1 answer
  • Application software can run without the presence of system software true or false ​
    5·1 answer
  • Please, ignore
    6·2 answers
  • During the data transmission there are chances that the data bits in the frame might get corrupted. This will require the sender
    8·1 answer
  • Are there any Potential Dangers in Artificial Intelligence?
    11·2 answers
  • In the 1760s and early 1770s, the British government wanted to raise money by taxing the residents of its colonies in North Amer
    8·1 answer
  • An internet ________ is a collection of utility programs designed to maintain your security and privacy while you are on the web
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!