1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuki888 [10]
2 years ago
11

Case Project 9-4: Troubleshoot an IP configurationYou work at a help desk and have just received a call from an employee who say

s she can’t access network resources. You want the employee to view her IP address configuration. Write an e-mail to the employee explaining what command-line program to use and how she can use it to find the information you need. After following your instructions, the employee tells you that her IP address is 169.254.14.11 with the subnet mask 255.255.0.0.a. Write an e-mail to the employee explaining what command-line program to use and how she can use it to find the information you need.b. What conclusion can you make from the employee’s information about her IP address and subnet mask?
Computers and Technology
1 answer:
Svetllana [295]2 years ago
4 0

Answer:

To get the IP address and other information on the workstation, type 'ipconfig' for windows or 'ifconfig' or Linux and press the return key.

The subnet mask is a class B type and 169.254.14.11 IP address shows that the workstation cannot access the DHCP server, so the IP address is not properly configured for network connection.

Explanation:

A computer network is an interconnection and intercommunication of two or more computer devices. All devices in a network must have an IP address, which can be static or dynamic from a DHCP server.

When a computer is configured to receive IP address from a DHCP server, but cannot reach the server, the IP address from the range of 169 is automatically assigned to it but still would not be able to communicate with other devices in the network.

You might be interested in
Describe your previous personal or professional experience with Microsoft Word.
Stolb23 [73]

Answer:

Microsoft Word is pretty helpful.

Explanation:

I go to school and at school I have projects with Microsoft Word and it's pretty easy to understand. I'd recommend.

8 0
2 years ago
........ is a formal description of message formats and the rules for exchanging those messages
BabaBlast [244]

Answer:  Protocols

Explanation: In accordance with the distributed system design. protocols are referred as the set of rules through which the exchange of messages take place in a system. It also helps in describing the format of the message in appropriate and formal way .

On the basis of protocols, the communication between the nodes present in the distributed system takes place for coordination and interchange the formatted message.  

4 0
3 years ago
Which of these is NOT an example of a GUI?
aksik [14]

Answer:

The answer to this question is given below in the explanation section.  

Explanation:

First, we need to know what is the graphic user interface (GUI)?

A GUI is a form of user interface that allows the users to interact with electronic devices through graphical icons and audio indicator such as primary notation, instead of a text-based user interface as in MS-DOS. Users interact through such devices using their icon, navigation using the mouse cursor, etc , and touching. In short, an interface that has graphical options.

so, in the context of the question, the following are examples of GUI.

Virus protection software: Because virus protection software has a graphical interface and user can use it easily by using its graphics and exploration functionality.

Icon: icon is an example of GUI because ICON built on other many graphics parts. In short, the icon is part of the GUI.

The followings are not the example of GUI:

Microphone and USB cord because these are the electronic parts and they don't possess the GUI.

5 0
2 years ago
What statement best decribes the relashionship bewteen science and technoligy?
butalik [34]
The correct answer would be A.
7 0
3 years ago
Read 2 more answers
Before posting a picture online, make sure to
chubhunter [2.5K]
You have to make sure that the site is safe to post to avoid phishing. There are some options available in social media that can help you customize the settings of your viewers. It can give you more control to choose whether you wanted it to be seen in public, by friends or just yourself.  
8 0
3 years ago
Other questions:
  • A structure that specifies which of a number of permitted data types (e.g. integers) that may be stored in its instances is:
    6·1 answer
  • When public relations professionals make provocative statements in newsgroups to get people to visit an organization's website o
    10·1 answer
  • What lets you do many things, like write book reports and stories?
    15·1 answer
  • The Windows Remote Desktop Web connection that allows users to connect to a work or home computer and access files is considered
    7·2 answers
  • At each layer of the OSI model, data is appended to the original message and then sent on to the next lower layer. What is this
    10·1 answer
  • 2.
    8·1 answer
  • You are sending Secret information to a colleague located at another office. You want to give him some background information an
    15·1 answer
  • At which track meet did two runners finish in a time equivalent to the mode?
    14·1 answer
  • Which of the following statement is correct ? A . potential difference is measured by ammeter . B . The unit of potential differ
    9·1 answer
  • How have these advances in-home technology changed the role of technicians in our society?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!