1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
muminat
4 years ago
10

Rosa has received reports by several users that one of the Linux servers is no longer accessible. She is able to remote into the

server using a management IP address separate from the one that users would be directed to via a DNS lookup. Which commands, once connected to the server, should she use to start troubleshooting the issue?
Computers and Technology
1 answer:
goldenfox [79]4 years ago
5 0

Answer: hello options related to your question is missing attached below are the missing options

answer

ping ( b )

Explanation:

The command she should use once she is connected to the server, should be ping command (127.0.0.1) .

This is because this command is used to check if the network is working appropriately and also to test client and server connection on the network.

You might be interested in
Orphan record example?
Goryan [66]

Answer:

If we delete record number 15 in a primary table, but there's still a related table with the value of 15, we end up with an orphaned record. Here, the related table contains a foreign key value that doesn't exist in the primary key field of the primary table. This has resulted in an “orphaned record”.

4 0
3 years ago
The computer that has been traditionally found on the desks in many offices and homes is the ___ computer.
Sladkaya [172]

Answer:

<u> Personal</u> computer

Explanation:

I.d.k the answer so don't blame me if its incorrect

7 0
3 years ago
Which type of security policy is intended to provide a common understandingof the purposes for which an employee can and cannot
Zigmanuir [339]

Answer:A. ISSUE-SPECIFIC

Explanation:Security policy is a set of actions an organization,Country , State or local governments put in place on order to guarantee the security of life and properties. It can also be described as the restrictions on behavior or actions of members of a society, community or an organization as well as restrictions imposed on adversaries by processes such as doors, locks, keys and walls.

Issue specific policy are policies directed to treat or handle particular factors known to aid or abate a crime. It can also be used to outline or reach at an understanding of what to used or what not to use in order to ensure effective security in an organization.

6 0
4 years ago
A stepping function allows a program
vichka [17]

Answer:

To be inspected line by line.

Explanation:

8 0
4 years ago
Read 2 more answers
Why does temperature decrease with higher altitude?
Lelu [443]
It's B.

As you go up, the air thins out, meaning it is less dense. Since there are less molecules that can transfer heat, the temperature is lower.
4 0
4 years ago
Other questions:
  • Create a different version of the program that: Takes a 3-digit number and generates a 6-digit number with the 3-digit number re
    14·1 answer
  • Drag the tiles to the correct boxes to complete the pairs. Match the tools that you can use while solving a problem with their c
    6·2 answers
  • Create a program asks a user for an odd positive integer. If the user gives and even number or a number that is negative it prom
    7·1 answer
  • You have just built a new system from scratch. you turn the computer on but the system boot fails and sounds a beep code. what m
    15·1 answer
  • What is the maximum rate at which computers A and B can communicate, via router X? (your answer should be in Mbps)
    12·1 answer
  • Quinton is having trouble learning Spanish because he keeps reverting back to the grammatical structures of his native English l
    6·1 answer
  • তথ্য ও যোগাযোগ প্রযুক্তির প্রশ্ন(45)10 সংখ্যাটির সমতুল্য মান?
    14·1 answer
  • Cost, time, knowledge are examples of
    9·1 answer
  • Can you please help me?
    6·1 answer
  • What physical disk oriented performance counter should be used to determine the number of requests waiting to be processed by a
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!