1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bazaltina [42]
3 years ago
9

You configured the IP address and DNS name of a new internal web server named WEB3. Your first test from a web browser on your w

orkstation was successful. But when you came to work this morning, you were not able access WEB3 from the same workstation using the same browser. You get an error message stating that this site cannot be reached.
You have not changed the server's IP configuration since the successful test the night before.

Which troubleshooting step should you try first to discover what the problem might be?
Computers and Technology
1 answer:
bonufazy [111]3 years ago
3 0

Answer:

I would reset the Domain Name System (DNS)

Explanation:

One factor that could lead to the "Site Cannot Be Reached" error is DNS "poisoning". Another is invalid DNS cache. Both can be caused by an attack on the system by people trying to spoof the system. Spoofing ensures that even when the right address is entered, it leads one to another web address.

One way to quickly reset the DNS is to run ipconfig /flushdns

This helps to clear the DNS cache.

Once the DNS cache has been successfully flushed, the system returns a confirmatory message that reads “flushed the DNS resolver cache”.

The systems administrator can now proceed to reconfigure the IP address(es)

Cheers

You might be interested in
Many websites (mostly online shopping sites), monitor a person’s Internet browsing behavior, such as the websites we often visit
mamaluj [8]

Answer:

Yes, this pratice is ethical

Explanation:

You are freely choosing to go on to these websites and most websites inform you that they are doing this. Edward Snowden, told the world that goverments are spying on them. Most people did not have a problem with this. Since, most people have a way to inform themsevles about the practices on the websites(by reading the terms of serve) and people don't care about spying than this is in no way unethical practice.

7 0
3 years ago
I need topics/suggestions for a highschool survey.
erik [133]

Answer:

what do you like about this school?

what do you think we should do Differently

what club would you take?

3 0
3 years ago
Explain: The fetch part of fetch decode execute cycle
MArishka [77]

Answer:

Look at the image

Explanation:

7 0
3 years ago
How many centimeters are there in 1 meters
konstantin123 [22]
1 meters is = 100 centimeters
8 0
4 years ago
Read 2 more answers
Discuss five processes for analyzing a qualitative study
xxMikexx [17]

1. Prepare and organize your data.

Print out your transcripts, gather your notes, documents, or other materials. Mark the source, any demographics you may have collected, or any other information that will help you analyze your data.

2. Review and explore the data.

This will require you to read your data, probably several times, to get a sense of what it contains. You may want to keep notes about your thoughts, ideas, or any questions you have.

3. Create initial codes.

Use highlighters, notes in the margins, sticky pads, concept maps, or anything else that helps you to connect with your data. See the attached document that demonstrates how one might highlight key words and phrases as well as make notes in the margins to categorize the data:

4. Review those codes and revise or combine into themes.

Identify recurring themes, language, opinions, and beliefs.

5. Present themes in a cohesive manner.

Consider your audience, the purpose of the study, and what content should be included to best tell the story of your data.

Hope this helped you!!!

4 0
3 years ago
Read 2 more answers
Other questions:
  • Dr. Joon asks her students how to insert a table in an Excel workbook. The students record the steps a chart. Which students lis
    15·1 answer
  • Plz help! 3 questions! 1.The ideal light to use is.... A.front light B.a combination of side and back light C.a combination of f
    10·1 answer
  • The SmoothWall open source firewall solution uses colors to differentiate networks. Which color indicates the private, trusted s
    9·1 answer
  • WRITE A JAVA PROGRAM TO PRINT THE PATTERN<br> 13579<br> 2468<br> 357<br> 46<br> 5
    12·1 answer
  • Which of these files, when included in a program, will provide user assistance?
    5·2 answers
  • What type of maintenance is required of a computer’s power supply to ensure that it remains in working order?
    15·2 answers
  • Why do electronic devices gather so much dust? Thanks
    8·1 answer
  • Define a toString prototype method that returns the cat's name, gender, and age separated by semicolons.
    8·1 answer
  • Mention any
    14·1 answer
  • Which blu-ray standard defines rewritable disks?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!