1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vika [28.1K]
3 years ago
13

You work in an office that uses Linux and Windows servers. The network uses the IP protocol. You are sitting at a Windows workst

ation. An application you are using is unable to connect to a Windows server named FileSrv2. Which command can you use to determine whether your computer can still contact the server?
Computers and Technology
1 answer:
Aleksandr-060686 [28]3 years ago
4 0

Answer:

PING

Explanation:

To check if there's still connectivity between the computer and server, I would use the ping command.

The ping command is primarily a TCP/IP command. What this command does is to troubleshoot shoot. It troubleshoots connection and reachability. This command also does the work of testing the name of the computer and also its IP address.

You might be interested in
What is data security
NARA [144]
Data security refers to the process of protecting data from unauthorized access and data corruption throughout its lifecycle. Data security includes data encryption, tokenization, and key management practices that protect data across all applications and platforms.
5 0
3 years ago
Please help again if anyone doesn't mind
Andrew [12]

Answer:

D

Explanation:

3 0
3 years ago
A ______ connection provides fast internet service and the ability to exchange large files. ​
Degger [83]

Answer:

broadband

Explanation:

A<u> broadband</u> connection  provides fast internet service and the ability to exchange large files. ​

3 0
3 years ago
An example of what you can post that shows kindness to other
harina [27]

Answer:

everybody is awesome

Explanation:

5 0
3 years ago
The two types of one-time-password tokens are ______ and ______.
Nutka1998 [239]

Answer:

event based and time based

Explanation:

OTP tokens come in two types: event-based (HOTP) and time-based (TOTP). Event-based OTP tokens generate new codes at the press of the button and the code is valid until it is used by the application. Time-based OTP tokens generate codes that are valid only for a certain amount of time (eg, 30 or 60 seconds), after which a new code must be generated

5 0
4 years ago
Read 2 more answers
Other questions:
  • If you plan on operating several applications at s time, the amount of RAM should be considered when purchasing a computer
    10·2 answers
  • Can someone help me with...A table can help? PLEASE
    8·1 answer
  • Garry is a record executive who is building a data table to include in a presentation about one of his artists. The table is mea
    15·1 answer
  • How to connect an Apple Watch series 3 to your iPhone (ASAP)
    6·2 answers
  • Describe the positive and negative effects of Internet​
    6·2 answers
  • Which of the following is not an Operating System? Select one:
    13·1 answer
  • Imagine a network with two routers that are connected with a point-to-point HDLC serial link. Each router has an Ethernet, with
    9·1 answer
  • In 100 words or less, discuss why ethics is especially important for computer professionals, as it pertains to addressing profes
    5·1 answer
  • Which of these is not a valid form<br>layout in Microsoft Access?​
    11·1 answer
  • 25 Points Asap <br> Write a Java program named Light.java that displays a light bulb shown below:
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!