1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yuradex [85]
3 years ago
11

Kim, a user, took a laptop on vacation and made changes to the configuration in order to use the device at the hotel. She can re

ach the Internet, but cannot access any internal network resources.Which of the following is the MOST likely reason?
A. DNS
B. subnet mask
C. Duplicate IP address
D. SSID
Computers and Technology
1 answer:
viktelen [127]3 years ago
4 0

Answer:

d

Explanation:

its because you didn't reconfigure the ssid settings

You might be interested in
Precautionary measures to be observed when using ICT tools​
Dafna11 [192]

Answer:

ICT is the abbreviated form of Information and Communication. It included different technologies like mobile phones, computers, USBs etc.

Following are two precautionary measures which should be observed when using any kind of ICT:

  1. Use of Antivirus: It can used to protect anything placed inside the technology especially from hacking and viruses which can create many issues.
  2. Backup Data: Creating a backup of the data stored in the device is important as it can be recalled when the device malfunctions. Backup of the data can be created through using USBs, CDs etc or through cloud storage
7 0
3 years ago
Kiara is using her software's graphic formats to create a line graph. As she
rewona [7]

Answer:

Correct the data she entered, and the software will adjust the  graph.

Explanation:

Software is used to work with ease and efficiency. If there is any mistake during data entry, we can easily change that particular data and make it correct. There is no need to delete whole data and re enter the data again. As most of the software are user friendly and have the option to edit the information that already has been entered.

In mentioned case, Kiara should edit the data, that has been entered incorrect. After the correction of data, the graph will be automatically updated with new values and she found correct graph.

8 0
3 years ago
Read 2 more answers
Persons who have been given access to an installation can be counted on to be of no threat. true or false? (antiterrorism scenar
aliya0001 [1]
<span>The statement that "Persons who have been given access to an installation can be counted on to be of no threat" is false. If they are not honest enough, they could become the dangerous staff the company could ever had because he or she has access to everything, files, information, etc. That is why, in selecting a person to be trusted with such responsibility, he or she undergoes an intensive training.</span>
4 0
3 years ago
The Joint Photographic Experts Group developed the ___________ graphic format.
jolli1 [7]
1. <span>The Joint Photographic Experts Group developed the jpeg graphic format. 
2. </span><span>It is important to include the alt attribute of the tag because some people use text-only Web browsers. </span>
4 0
3 years ago
Read 2 more answers
PYTHON 3 CODE HS HELP PLZ
Tju [1.3M]

Answer:

B

Explanation:

It adds the same number over and over again, 'number' times.

This is number*number, a.k.a. number². (squared)

3 0
2 years ago
Other questions:
  • The Internet of Things (IoT) is a concept with emphasis on machine-to-machine communications to describe a more complex system t
    10·1 answer
  • A(n) _____ allows a user to choose specific files to back up, regardless of whether or not the files have been changed.
    9·1 answer
  • The data in a data warehouse have which of the following characteristics?
    13·1 answer
  • When you purchase software in a box, reading the ________ is important to know if the software will function properly?
    13·1 answer
  • 50 points!!!!!
    9·2 answers
  • Written Hawaiian also has fairly simple spelling rules for determining if a word is a valid word in the language (even if the me
    9·1 answer
  • Free 35 points!!!
    11·2 answers
  • QueSUUN TU
    15·1 answer
  • Which of the following techniques can you not use to make the members of the std namespace available to your code? a. Code a usi
    11·1 answer
  • Does anyone know what episode Hinata threatens useless sakura?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!