1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuki888 [10]
2 years ago
11

Case Project 9-4: Troubleshoot an IP configurationYou work at a help desk and have just received a call from an employee who say

s she can’t access network resources. You want the employee to view her IP address configuration. Write an e-mail to the employee explaining what command-line program to use and how she can use it to find the information you need. After following your instructions, the employee tells you that her IP address is 169.254.14.11 with the subnet mask 255.255.0.0.a. Write an e-mail to the employee explaining what command-line program to use and how she can use it to find the information you need.b. What conclusion can you make from the employee’s information about her IP address and subnet mask?
Computers and Technology
1 answer:
Svetllana [295]2 years ago
4 0

Answer:

To get the IP address and other information on the workstation, type 'ipconfig' for windows or 'ifconfig' or Linux and press the return key.

The subnet mask is a class B type and 169.254.14.11 IP address shows that the workstation cannot access the DHCP server, so the IP address is not properly configured for network connection.

Explanation:

A computer network is an interconnection and intercommunication of two or more computer devices. All devices in a network must have an IP address, which can be static or dynamic from a DHCP server.

When a computer is configured to receive IP address from a DHCP server, but cannot reach the server, the IP address from the range of 169 is automatically assigned to it but still would not be able to communicate with other devices in the network.

You might be interested in
You have a folder on your Windows desktop system that you would like to share with members of your development team. Users need
horrorfan [7]

Answer:

modify the NTFS permissions on the folder

Explanation:

In order to solve this problem what you need to do is to modify the NTFS permissions on the folder. The NT File System permissions are security measures blocking access to manipulation of files within a directory and affects local users as well as network users. By adjusting the permissions of this within the folder that the members are trying to access then it will give them the ability to modify the files.

5 0
3 years ago
If you specify a user without specifying a hostname, mysql will
ruslelena [56]
<span>If you specify a user without specifying a hostname, mysql will </span>automatically put a percent sign (%) the host to show that the user can connect from any host.
3 0
3 years ago
When you add encryption to a powerpoint presentation what does it do
abruzzese [7]

Answer: your document will be inaccessible

5 0
2 years ago
Which course must first-time drivers in Florida take to be eligible for their Learner License?
Travka [436]
The Traffic Law and Substance Abuse Course (TLSAE), which is also known as the drug and alcohol course.
7 0
3 years ago
Carl wants to add a new slide to his PowerPoint presentation. Which option should he use?
djverab [1.8K]

Answer:

C on edg

Explanation:

I just took the review

8 0
3 years ago
Read 2 more answers
Other questions:
  • To change to the completed application’s directory, we opened a command window and used the ________ command to change to the di
    7·1 answer
  • What would happen if a pc that contains a power supply that does not automatically adjust for input voltage is set to 230 volts
    13·1 answer
  • Egyptian hieroglyphs were part of a writing system used by the ancient Egyptians. What type of graphic design elements did they
    13·1 answer
  • the type() function in python does what when you give it an object. returns the last keystrokes from the user. fill the object w
    9·1 answer
  • What type of network is capable of delivering voice, video streams, text, and graphics between many different types of devices o
    15·1 answer
  • Direct Mapped Cache. Memory is byte addressable. Fill in the missing fields based upon the properties of a direct-mapped cache.
    6·1 answer
  • The 8-bit ____ field is used by source network hosts and forwarding routers to distinguished classes or priorities in ipv6 packe
    11·1 answer
  • k-means clustering cannot be used to perform hierarchical clustering as it requires k (number of clusters) as an input parameter
    15·1 answer
  • Lab 8-1: Working with Boot Loader and Runlevels what is the root password
    9·1 answer
  • In _________, the process requests permission to access and modify variables shared with others. a) entry section b) critical se
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!