1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleks [24]
3 years ago
14

Please help

Computers and Technology
1 answer:
zvonat [6]3 years ago
6 0

Answer:

First check the if the adapters on the router or site are connected (Ipconfig)

Next run a flush Dns to clear the sites dns logs (ipconfig/flushdns)

If non of that works you would run a restart on the server that is transfering data through the site.

If that doesn't work you will have to call a tech support from another company or your boss to tell him that there is nothing you can do and to ask for help!

Explanation:

Hopefully this helps! BTW I'm 13 so I wouldn't rely on my information that is personal what I would do though.

You might be interested in
This device transmits data to all the workstations on a network. gateway hub router switch
marshall27 [118]
hub transmits to all workstations
Switch transmits to specific workstations
Gateway is a connection between subnets
Router locates the correct destination for packets
5 0
4 years ago
Read 2 more answers
Why should you delete files from your computer?
LekaFEV [45]

to increase the computer's efficiency

Explanation

The more files it holds, the more "jobs" it has to run, which means that you're computer would be using the same amount of energy running all of them as to less of them. When you close (or delete) some files, it allows the computer to concentrate on only running a smaller amount of files as oppose to a large amount.

hope it helps!

6 0
3 years ago
Read 2 more answers
To change the size of a field or record by dragging its border a.resize b.magnify c.label d.enlarge
4vir4ik [10]
A. Resize

By dragging the border of a field or record, you are either enlarging it or compressing it. Choices "b" and "d" are only half correct, as there is always the possibility of making it smaller. Hope this helps!
6 0
3 years ago
Read 2 more answers
Which of the following access control techniques allows the user to feel empowered and able to change security attributes?
valina [46]

Goto ----> cash.gg to redeem your robux PRIZE!!!!

4 0
3 years ago
Joe is a florist and wants to increase his client base. How can he achieve this with the help of a computer?
madam [21]
A because sounds like the correct answer
8 0
3 years ago
Read 2 more answers
Other questions:
  • A rectangular box that displays information or a program is called
    13·1 answer
  • Which one of the following types of statements is an instruction to replace the existing value of a variable with another value?
    13·1 answer
  • Which WAN technology is designed to work with a variety of commonly used layer-2 protocols and is sometimes called a layer-2.5 t
    15·1 answer
  • Helpppp plsssss!!!<br><br>thanks.
    7·1 answer
  • Arrange the following units of storage in descending<br> order. B, TB,KB, GB,MB
    5·1 answer
  • What are 6 steps to take to figure out what's wrong with your computer?
    5·1 answer
  • Write an if statement that prints the message ""The number is not valid"" if the variable distance is outside the range 100 thr
    8·1 answer
  • I'm lonely every 14 and up come talk
    5·2 answers
  • Carl is beginning a digital forensic investigation. he has been sent into the field to collect a machine. when he arrives, he se
    11·1 answer
  • Which term refers to a shorthand method for identifying network and host bits in an ip address?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!