1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timofeeve [1]
3 years ago
5

A computer can successfully ping outside the local network, but cannot access any world wide web services. what is the most prob

able cause of this problem?
Computers and Technology
1 answer:
mrs_skeptik [129]3 years ago
7 0
<span>Windows Firewall is blocking port 80.</span>
You might be interested in
The ____ option must be used when running a program in order to see the results of assert statements.
Lera25 [3.4K]

Answer:

-ea

Explanation:

We can enable or disable assertions in java, by default this assertions are disabled at runtime, but we can use two commands, for example, if we want to enable assertions at various granularities, we can use the -enableassertions, or -ea, switch, if we want to disable at various granularities, is -disableassertions, or -da.

4 0
3 years ago
Which of the following is not a basic networking hardware component? Network interface card
RideAnS [48]

Answer:

Device Driver

Explanation:

All of the other options are physical and are something that you can physically touch. The device driver runs in software and allows the computer to communicate with the device that is attached.

4 0
3 years ago
An organization is using Amazon CloudWatch Logs with agents deployed on its Linux Amazon EC2 instances.
Dahasolnce [82]

Answer:

A and B

Explanation:

EC2 run command gives a management output to review various instances and servers. Here, the logging files, collecting metrics and patches, running script installations can be achieved.

Verify the user permission and the run command, confirms if whether or not the problem of missing logging files is from the settings.

There are several AWS and customer managed policies for cloudwatch logs to give users certain levels for permission. Verifying this determines if there is full access, group logs and creation of group log events, or even a read only access.

3 0
4 years ago
What kind of network connection do you think is used to connect most wireless video game controllers to consoles, and why would
Ostrovityanka [42]

Answer:

I would say Lan

Explanation:

5 0
3 years ago
True or False. When clicking the button, the program displays OK1 OK2. When clicking the button, the program displays OK1. When
zaharov [31]

Answer:

False, The program has no compile error.

Explanation:

import javafx.application.Application;

import javafx.scene.Scene;

import javafx.scene.control.Button;

import javafx.stage.Stage;

public class Test extends Application {

 @Override // Override the start method in the Application class

 public void start(Stage primaryStage) {

   // Create a button and place it in the scene

   Button btOK = new Button("OK");

   btOK.setOnAction(e -> System.out.println("OK 1"));

   btOK.setOnAction(e -> System.out.println("OK 2"));

   Scene scene = new Scene(btOK, 200, 250);

   primaryStage.setTitle("MyJavaFX"); // Set the stage title

   primaryStage.setScene(scene); // Place the scene in the stage

   primaryStage.show(); // Display the stage

 }

 public static void main(String[] args) {

   launch(args);

 }

}

Java has an inline compiler, so if the line of code for an event is repeated twice and they both are not segmented, they will be compiled consecutively.

8 0
3 years ago
Other questions:
  • Database management systems _____. a. include transaction-processing reports for database analysis b. are used to create, organi
    6·1 answer
  • Select five system utility functions.
    11·1 answer
  • ________ are used in input, processing, and output operations that can help create more efficient programs as the data can be pr
    11·1 answer
  • Intuitively, which of the following would happen to e⃗ net if d became very large?
    6·1 answer
  • Write an application that allows a user to enter any number of student quiz scores, as integers, until the user enters 99. If th
    5·1 answer
  • What was original name<br> whoever answers first gets brainly crown
    9·1 answer
  • PLSSSSS HELPP!! Population biologists are concerned about invasive species such as the zebra mussel found in North American wate
    7·1 answer
  • Someone please help ASAP will brainlist
    9·2 answers
  • Class 10 computer unit 1 all excersise​
    12·1 answer
  • A web application with an SQL server database is found to be compromised by an attacker. On examination, the email IDs of the da
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!