1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
crimeas [40]
3 years ago
11

First Computers and Technology question in 4 years..

Computers and Technology
1 answer:
g100num [7]3 years ago
3 0

Answer:

In computer networking, a wireless access point, or more generally just access point, is a networking hardware device that allows other Wi-Fi devices to connect to a wired network

Explanation:

You might be interested in
A group known as ""Takedown"" hacked into your political action committee website and defaced it. Which type of threat actor is
natima [27]
<h2>Answer:</h2><h3>Hacktivist group is most likely to responsible for this.</h3><h3 /><h2>Explanation:</h2>

Hacktivism is defined as an action in which a computer or a network is targeted so that it could be misused in order to achieve a goal against any social or political action.

Hacktivists are the persons who perform hacktivism in order to seek attention on a specific thing or issue they want, from all the people.

In the given scenario, the hacking attack is hactivism as it is done to pull the company down.

Hacktivist can be a single person as well as a group of people working together. However they try to work anonymously so that they could not be traced.

<h3>I hope it will help you! </h3>
6 0
3 years ago
Many people describes computers as complex machine. what can this mean?
Airida [17]
They work in many different ways?
8 0
3 years ago
I didn't go to school today and i want to know if my teacher would contact my parents.
AURORKA [14]

the school will call your parents

6 0
3 years ago
You have an Active Directory forest of two trees and eight domains. You haven’t changed any of the operations master domain cont
Vikentia [17]

Answer:

Option C is the correct option.

Explanation:

The following option is correct because the user has two trees and also has eight domains of the Active Directory Forest and the user not done any alteration on the operations of the master domain controllers then, the schema master is on the 1st domain controller that is in forest root domain controller.

8 0
3 years ago
While troubleshooting an Internet connection problem for your network, you restarted the modem and then the router. The router i
grandymaker [24]

Answer:

d. ipconfig /release

b. ipconfig /renew

a. ping

c. nslookup microsoft.com

Explanation:

A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

Basically, it is an electrical device or node that is designed to connect two (2) different networks (in different locations) together and allows them to communicate.

Generally, routers are configured using a standard routing protocol with an IP address as the default gateway.

Dynamic Host Configuration Protocol (DHCP) is a standard protocol that assigns IP address to users automatically from the DHCP server.

Basically, a DHCP server is designed to automatically assign internet protocol (IP) address to network devices connected to its network using a preconfigured DHCP pool and port number 67.

On a related note, when a computer that is configured with DHCP cannot communicate or obtain an IP address from the DHCP server, the Windows operating system (OS) of the computer automatically assigns an IP address of 169.254.33.16, which typically limits the computer to only communicate within its network.

I. ipconfig /release

II.. ipconfig /renew

III. ping

IV. nslookup microsoft.com

7 0
3 years ago
Other questions:
  • You have implemented a network where hosts are assigned specific roles, such as for file sharing and printing. Other hosts acces
    7·1 answer
  • How do you know if you get a phone call that is a scam
    8·2 answers
  • Write a program that asks the user for a CSV of the NYC Open Data Film Permits: There is a sample file for June 2019 film permit
    9·2 answers
  • What power brake uses vacuum from the engine to aid in brake application?
    6·2 answers
  • While reviewing system logs, a security analyst notices that a large number of end users are changing their passwords four times
    13·1 answer
  • I want to sign up for brainly but it won't let me. It keeps saying "we can complete your registration at this time".
    13·1 answer
  • A motor is controlled by a logic circuit. The circuit has inputs (0 or 1) from three sensors
    8·1 answer
  • 24 POINTS!!! <br> Why are Sequences, Selection, and Iteration building blocks of algorithms?
    5·1 answer
  • Quired to the weight
    12·1 answer
  • How does the sky change as onegets above Earth’s atmosphere?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!