While troubleshooting an Internet connection problem for your network, you restarted the modem and then the router. The router is now communicating with the Internet, which you can confirm by observing the blinking light on the router's WAN indicator. However, now your laptop is not communicating with the router. Order the commands below to fix the problem and confirm connectivity.
a. ping
b. ipconfig /renew
c. nslookup microsoft.com
d. ipconfig /release

Answers

Answer 1

Answer:

d. ipconfig /release

b. ipconfig /renew

a. ping

c. nslookup microsoft.com

Explanation:

A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

Basically, it is an electrical device or node that is designed to connect two (2) different networks (in different locations) together and allows them to communicate.

Generally, routers are configured using a standard routing protocol with an IP address as the default gateway.

Dynamic Host Configuration Protocol (DHCP) is a standard protocol that assigns IP address to users automatically from the DHCP server.

Basically, a DHCP server is designed to automatically assign internet protocol (IP) address to network devices connected to its network using a preconfigured DHCP pool and port number 67.

On a related note, when a computer that is configured with DHCP cannot communicate or obtain an IP address from the DHCP server, the Windows operating system (OS) of the computer automatically assigns an IP address of 169.254.33.16, which typically limits the computer to only communicate within its network.

I. ipconfig /release

II.. ipconfig /renew

III. ping

IV. nslookup microsoft.com


Related Questions

We have an N x N square grid.


We will paint each square in the grid either black or white.

If we paint exactly A squares white, how many squares will be painted black?

A and N are integers,

Print the number of squares that will be painted black.
C++

Answers

Answer:

The solution in C++ is:

#include <iostream>

using namespace std;

int main(){

   int N, A;

   cout<<"Grids: ";    cin>>N;

   cout<<"White: ";    cin>>A;

   cout<<"Black: "<<N * N - A;

   return 0;

}

Explanation:

This declares N and A, as integers

   int N, A;

This gets inputs for N

   cout<<"Grids: ";    cin>>N;

This gets inputs for A, (the white grids)

   cout<<"White: ";    cin>>A;

This calculates and prints the number of black grids

   cout<<"Black: "<<N * N - A;

PS

From the question, we understand that the grid is N by N square grids.

This means that:

[tex]Total = N * N[/tex]

So, the number of black grids is:

[tex]Black = Total - A[/tex]

what is example of application of machine learning that can be imposed in eduction. (except brainly.)

Answers

Answer:

Machine Learning Examples

Recommendation Engines (Netflix)

Sorting, tagging and categorizing photos (Yelp)

Self-Driving Cars (Waymo)

Education (Duolingo)

Customer Lifetime Value (Asos)

Patient Sickness Predictions (KenSci)

Determining Credit Worthiness (Deserve)

Targeted Emails (Optimail)

what is the printed version of what you see on the computer screen​

Answers

Answer:

screenshot

Explanation:

screenshot

Answer:

a  image of  what is on your screen on paper

Explanation:

This is a  image of the screen of your computer with all images pasted out in paper form

What is the full form of USB​ ?

Answers

Answer:

universal serial bus: an external serial bus interface standard for connecting peripheral devices to a computer, as in a USB port or USB cable.

Explanation:

You are sitting at the local coffee shop, enjoying your favorite latte. You pull out your laptop and, using the wireless network available at the coffee shop, access your e-mail. List all the different networks possibly involved in this operation.

Answers

Answer:

Laptop computer is connected to wireless connection in the coffee shop, which is connected to an ISP which is connected to the Internet.

Explanation:

The laptop's Wireless connection is turned on such that it is enabled to find wireless connection access signals within a certain Radius. The ability to connect to a wireless network is that the coffee shop has open wireless connection which is detected by the laptop signals and connects to it. The wireless connection provided by the coffee shop is connected to a certain internet service provider which eneblws connected networks to be able to access the internet.

While using PERT (Program Evaluation Review Technique) and CPM (Critical Path Method) techniques, activities that are on the critical path are more flexible than those activities which are not on the critical path.

a. True
b. False

Answers

Answer:

b. False

Explanation:

The Critical Path Method(CPM) is used to determine the maximum time to finish a project based on the total maximum time of the network of interdependent activities in the project. The CPM is usually used in conjunction with the Program Evaluation Review Technique(PERT). If an activity is in the critical path then it is at its maximum or longest duration time and cannot be more flexible at this point.

DEFINITION of COMPONENT HARDWARE?

Answers

Answer: See explanation

Explanation:

Computer hardware refers to the physical parts of a computer, which includes the monitor, mouse, central processing unit (CPU), keyboard, computer data storage etc.

Hardware are the physical, computer devices, which helps in providing support for major functions like input, processing, output, and communication. The computer hardware is directed by the software to perform an instruction.

Select the correct answer.
A software development team is currently in the database creation phase of a project. Which activity will they undertake in this phase?
A.
memory allocation
B.
database design
C.
selecting a DBMS
D.
loading data

Answers

Answer:

database design is the correct e

Answer:

memory allocation

What will be the output of the following code
1 Private Sub Button1_Click(sender As Object, e As EventArgs) Handles Button1.Click
2
3
Pim val As Double
val - Math.Sqrt (12)
5
TextBox1.Text = val
6
7 End Sub

Answers

Answer:

3.4641016151377544

Explanation:

See picture for corrected code. The OCR messes up the code.

What are the types of Operating System​

Answers

Answer:

1. Gestión de la memoria principal

Esta es una característica del sistema operativo básica. La memoria principal de la computadora almacena los datos que serán usados por el CPU en la ejecución de los programas. El sistema operativo se encarga de gestionarla, es decir, asignar partes de memoria a la nueva información usada, y evitar que se sature.

2. Gestión de la memoria secundaria

Es la memoria más “permanente” de una computadora. Al igual que la memoria principal, el SO sistema operativo asigna el orden de guardado en esta memoria y la mejor manera de aprovechar el espacio libre.  

3. Gestión de procesos

Cuando envías un comando para que el ordenador realice una tarea, una de las funciones del sistema operativo es organizar los recursos de la computadora para ejecutarla. Esto incluye la memoria, el tiempo del CPU, los programas y archivos necesarios para ejecutar la tarea, los procesos que podrían entorpecerla y los periféricos que podrían ser necesarios para cumplirla.

4. Gestión de recursos  

¡Esta es una de las características del sistema operativo más importantes! El sistema operativo coordina los recursos del hardware que integra la computadora para cumplir con las tareas requeridas. El CPU, los periféricos, las memorias principal y secundaria, los programas, todo tiene que trabajar al unísono para cumplir con las tareas de forma óptima.

5. Gestión de usuarios  

El software operativo controla el acceso de los usuarios a las cuentas individuales o grupales. También, se encarga de administrar a qué recursos e información tiene acceso cada uno de ellos.  

6. Gestión de la seguridad  

Así como controla el acceso de usuarios, el sistema operativo también está encargado de gestionar los controles de seguridad de la computadora, entre ellos el firewall. Por ejemplo, en cuanto a la función del sistema operativo para la seguridad informática es evitar la pérdida de datos, controlar la confidencialidad de los datos y controlar el acceso a la información y a los recursos del equipo.

Websites can send __________ to your computer that stay on your hard drive and can track your web movements. Multiple Choice freeware cookies viruses pop ups

Answers

Answer:

Cookies

Explanation:

Cookies are pieces of information stored as text strings on your computer.

A web server sends you a cookie and a web browser stores it. The browser then returns the cookie to the server the next time the page is referenced. One of the most common uses of cookies is to store user ID. For example, the cookie might contain the following ID = 456894.

An example of a website that uses a cookie is an e-commerce website. When you visit the site and fill out a form, the website assigns you a user ID, stores your information with this user ID in the database on the web server and then returns this ID to your browser as a cookie.

The next time you visit the page, the browser sends this ID to the server. The server looks up this ID and then customizes the page it sends back to you. For example, you might see on the page, "Welcome back, David!"

When a virtual machine is
created, it is assigned
_____such as the CPU,
_____,Network Interface,
and storage..

Answers

Answer:

Resources, RAM

Explanation:

May be another choice for resources but the second one is definently RAM

It's currently 1:00 in the afternoon. You want to schedule the myapp program to run automatically tomorrow at noon (12:00). What two at commands could you use

Answers

Answer:

at 12 pm tomorrow

at now +23 hours

Explanation:

The at command could be used in the command line to perform a scheduled command in Unix related systems. The at command coule be ua d to program a complex script or used to perform simple scheduled reminders.

The at command is initiated by first writing the at string followed by the condition or statement to be performed.

Currently (1:00 pm) ; To make a schedule for 12pm then that will be at noon the following day:

at 12:00 pm tomorrow

Or :

Using the number of hours between the current tone and the schedule time : 12 pm tomorrow - 1:00 pm today is a difference of 23 hours ;

Hence, it can be written as :

at +23 hours

The process by which the kernel temporarily moves data from memory to a storage device is known as what?

Answers

Answer: Swapping

Explanation:

Swapping is referred to as the process by which the kernel temporarily moves data from memory to a storage device.

Swapping is simply a memory management scheme whereby the process can be swapped temporarily from the main memory to the secondary memory in order for the main memory to be available for other processes. Swapping is used for memory utilization.

You are developing a site for travel. From the homepage, a visitor wants to view packages for a trip to Japan. Based on the attached file structure and your knowledge of the Internet, write the code for links to the following:

Answers

Answer:

Explanation:

After finding the structure online that is mentioned in the question I was able to write out the necessary HTML code. The following code uses <a> tags which are the required tags for links. Inside these tags you will find the href attribute which tells the browser where to take the user when the user clicks on one of these links. Each link has the name of the link, for example, the first link will say "Visit Japan".

<a href="japan.html">Visit Japan</a>

<a href="family.html">Family Friendly Tours</a>

<a href="cycling.html">Cycling Enthusiast Tours</a>

<a href="culinary.html">Culinary Based Excursions</a>

For this assignment, you will use pointers to write a program that can be used to gather statistical data about the number of movies college students see in a month. The program should ask the user how many students were surveyed and dynamically allocate an array of that size. The program should then allow the user to enter the number of movies each student has seen. The program should then calculate the average, median, and mode of the values entered. Be sure to include comments throughout your code where appropriate.
Complete the C++ code

Answers

Answer:

Following are the program to the given question:

#include <iostream>//header file

#include <bits/stdc++.h>//header file

using namespace std;

int main()//main method

{

   int x,i,sum=0;//defining integer variable

   double average, median;//defining double variable

   cout<<"How many students were surveyed? ";//print message

   cin>>x;//input value

   int *a = new int[x]; //dynamically created array

   for(i = 0;i<x;i++)//defining for loop to input value in array

   {

       cout<<"Enter the number of movies seen by student number "<<i+1<<": ";//print message  

       cin>>a[i];//input value

   }

   for (int i = 0; i < x; i++)//defining loop for add value

       sum += a[i];   //use sum to add array value

   average = (double)sum/x;//defining average variable to calculate average

   cout<<"Average is "<<average<<endl;//print average value with message

   sort(a, a+x); //use sort method to sort array to find the median

   if (x % 2 != 0)//use if to check the even value

      median = (double)a[x/2];//calculating the median value

   else//esle block

       median = (double)(a[(x-1)/2] + a[x/2])/2.0;//calculating median value

   cout<<"Median is "<<median<<endl;//print median value with message

   int m_count=1 ,mode= a[0], c_count = 0;//defining integer variable

   for( i=1;i<x;i++)//defining for loop arrenge value

   {

       if(a[i]==a[i-1])//use if to check array value

       {

           c_count++;//increment c_count variable value

       }

       else//else block

       {

           if(c_count>m_count)//use if to check c_count greater than m_count

           {

               m_count = c_count;//holding value in m_count

               mode = a[i-1];//holding mode value

           }

           c_count = 1;//holding value integer value in c_count

       }

   }

   cout<<"Mode is "<<mode;//print mode value with message

   return 0;

}

Output:

Please find the attachment file.

Explanation:

Including header file.Defining the main method. Declaring integer and double type variables.Declaring integer array.Use the loop to the input value.After input, the value uses double variable "average, the median" that uses the for loop and conditional statement to check the value and hold in its variable.In the next step, another integer variable "m_count, mode, and c_count" is defined that uses the loop and conditional statement to check the median and mode value and hold its value into their variable.

If one wish to create a loop such that it will continuously add time elapsed between two functions with variable computation time until 1 hour is passed, what type of loop would be best

Answers

"Between two functions" not sure of what you mean there but here's a quick way to execute a function for an hour

Answer and Explanation:

var interval=setInterval(function(){

var i=0;

for (i=0; i <=60; i++){

for (i=0; i <70; i++){

console.log(i); }

}}, 60000);

If x=50.7,y=25.3 and z is defined as integer z,calculate z=x+y​

Answers

Answer:

Ans: 76

Explanation:

z=x+y

=50•7 + 25•3

=76#

Write a Java program which displays a menu to allow user the following functionality: 1. Load employees’ data - prompts user for the number of employees to be loaded and then prompts for each employee name, id (5 digit number), and annual salary

Answers

Answer:

Explanation:

The code I created is written in Java. It creates an Employee class that holds the employee's name, id, and salary. Then the main method has a menu that asks the user if they want to load data, print data, or exit. Each of which is fully functioning. If the user wants to load data, it asks them how many employees they want to add and then allow them to add the employees by calling the Employee class every time and saving the objects in an ArrayList. The program has been tested and the output can be seen in the image below.

import java.util.ArrayList;

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

      Scanner in = new Scanner(System.in);

      ArrayList<EmployeeData> companyData = new ArrayList<>();

      boolean loopAgain = true;

      while (loopAgain) {

          System.out.println("Menu:");

          System.out.println("1: Load Employee Data");

          System.out.println("2: Print Employee Data");

          System.out.println("3: Exit");

          int answer = in.nextInt();

          switch (answer) {

              case 1: {

                  System.out.println("How many employees will you add?");

                  int loop = in.nextInt();

                  for (int i =0; i < loop; i++) {

                      companyData.add(new EmployeeData());

                  }

              } break;

              case 2: {

                  for (EmployeeData x : companyData) {

                      x.printData();

                  }

              } break;

              case 3: loopAgain = false; break;

          }

      }

   }

}

class EmployeeData {

   String name;

   int id, salary;

   public EmployeeData() {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter Employee Name: ");

       String name = in.nextLine();

       System.out.println("Enter Employee ID:");

       int id = in.nextInt();

       System.out.println("Enter Employee Salary: ");

       int salary = in.nextInt();

       this.name = name;

       this.id = id;

       this.salary = salary;

   }

   public void printData() {

       System.out.println("Employee: " + this.name);

       System.out.println("ID: " + this.id);

       System.out.println("Salary: " + this.salary);

   }

}

Consider a system with seven processes: E, F, G, H, I, J, K and six resources: U, V, W, X, Y, Z. Process E holds U and wants V. Process F holds nothing but wants W. Process G holds nothing but wants V. Process H holds X and wants V and W. Process I holds W and wants Y. Process J holds Z and wants V. Process K holds Y and wants X. Is this system deadlocked?

a. Yes
b. No

Answers

Answer:

a. Yes

Explanation:

System is deadlock due to process HIK. Process H holds X and wants V and W. Process I holds W and wants Y. Process K holds Y and wants X. The system will become deadlock due to these three different processes.

Imagine you are trying to choose what restaurant to visit. You have a list of restaurants, each with a collection of star ratings. You also have a minimum standard; you will only go to a restaurant whose star rating is at least your minimum standard. Write a function called restaurant_rating. restaurant_rating has two parameters. The first is a dictionary, where the keys are restaurant names and the values are lists of ratings. The second parameter is your minimum rating. If a restaurant's average rating is above your minimum rating, you might visit it. If it is not, you won't. restaurant_rating should return a list of restaurants eligible for you to visit. That is, it should return a list of restaurant names from the dictionary whose average ratings (the average of the ratings in their lists) is greater than or equal to your minimum rating. This list should be sorted alphabetically. For example: rest_and_rating

Answers

Answer:

The function in Python is as follows:

def restaurant_rating(restaurants,minRatings):

   restaurantList = []

   for key in restaurants:

       if restaurants[key] >= minRatings:

           restaurantList.append(key)

           

   restaurantList.sort()

   return restaurantList

Explanation:

This declares the function

def restaurant_rating(restaurants,minRatings):

This initializes the list of eligible restaurants

   restaurantList = []

This iterates through the restaurant dictionary

   for key in restaurants:

If the ratings is greater than or equal to minimum ratings

       if restaurants[key] >= minRatings:

The restaurant name is appended to the restaurant list

           restaurantList.append(key)

Sort the eligible lists            

   restaurantList.sort()

Return the list

   return restaurantList

Study the following two class interfaces: class Question { public: Question(); void set_text(string new_text); void set_answer(string new_answer); void display() const; private: string text; string answer; }; class ChoiceQuestion : public Question { public: ChoiceQuestion(); void set_text(string new_text); }; Which member function from the Question class is overridden in the ChoiceQuestion class?

Answers

Answer:

The question function

Explanation:

The ChoiceQuestion function inherits from the Question class and should have it's functions and attributes as it is now a child of the Question class. It however overides the Question class function where it sets the ChoiceQuestion class function in the first function definition of the ChoiceQuestion class definition. This allows the child class to have it's own functions as well have access to the attributes and functions of the parent class.

A sales transaction was coded with an invalid customer account code (XXX-XX-XXX rather than XXX-XXX-XXX). The error was not detected until the updating run when it was found that there was no such account to which the transaction could be posted. A control procedure that would serve as a preventive control for this situation would be:

Answers

Answer:

a simple IF statement using Regex

Explanation:

In any coding language, a good control procedure for this would be a simple IF statement using Regex. In the IF statement you can grab the account code and compare it to a regular expression that represents the correct format. IF the account code is in the correct format (matches the regular expression), then you go ahead and save the account code for use. Otherwise, you would output an error and ask for another account code. This will prevent the program from trying to use an account code that is not valid.

when describing a software lincense what does the phrase "open source" mean?

Answers

Open source is like we’re you can your your notes

What tool can help discover and report computer errors when you first turn on a computer and before the operating system is launched?

Answers

Answer:

a post diagnostic

Explanation:

Answer:

post diagnostic Card

Explanation:

a post diagnostic card helps discover computer errors.

Which of the following represents knowledge as a set ofâ rules? A. Neural networks.B. Machine learning systems.C. Robotics.D. Expert systems.E. Genetic algorithms.

Answers

Answer:

D. Expert systems

Explanation:

Artificial intelligence (AI) also known as machine learning can be defined as a branch of computer science which typically involves the process of using algorithms to build a smart computer-controlled robot or machine that is capable of performing tasks that are exclusively designed to be performed by humans or with human intelligence.

Artificial intelligence (AI) provides smarter results and performs related tasks excellently when compared with applications that are built using conventional programming.

Generally, there are two (2) main characteristics of artificial intelligence (AI) systems and these include;

I. Non-algorithmic processing.

II. Symbolic processing.

In artificial intelligence (AI), the field of expert systems is the most important applied area because it models human knowledge.

Hence, expert systems represents knowledge as a set of rules.

Although, all expert systems are generally lacking in human capabilities and can only use inference procedures to proffer solutions to specific problems that would normally require human expertise or competence.

Some of the areas where expert systems can be applied are; monitoring, diagnosis, scheduling, classification, design, process control, planning, etc.

The Expert systems represent the knowledge as a set of rules. Thus option D is correct.

What is an expert system?

The system is the computer-based system that emulates all decision-making abilities of man and is designed to solving the complex problems by use of reasoning through the representation of IF-THEN rules.

The expert system is divided into the two types of systems such as knowledge base and inference engines. The knowledge base shows the facts and rules. The inference applies those facts to know the rules.

Find out more information about the expert systems.

brainly.com/question/9619145

What opeartions will acquire memory from heap? Select all that apply. Group of answer choices malloc new free declaraion

Answers

Answer:

malloc, new

Explanation:

Heap memory is that part of the memory which is allocated to the JVM and it is shared by all the executing threads in the application. This memory is used by the programming languages to store the global variables. All the global variables are stored in the heap memory by default. This memory is also known as the dynamic memory.

In C programming, the library function,  malloc is mainly used to allocate the block of the memory on the heap.

The new operation also acquires memory form the heap.

Thus, the answer is 'malloc' and 'new'.

Your friend Amy calls you asking for help with her new LCD monitor. She says the monitor isn't showing the whole picture. What is the resolution you should recommend for her to use

Answers

Answer:     probably 1080p (which is HD)

Explanation:    Lcd monitors mainly support 1080p.

When planning out the new data center where he is building a private cloud, Juan knows that he needs to account for all of the physical and logical resources that the servers will need in that new network. Which of the following must he account for in regard to the network part of his planning?
a. Ensure that he has enough MAC addresses for the virtual machines.
b. Ensure that he has enough IP addresses for the networks and subnets to account for the vNICs that are in bridging mode.
c. Ensure that there is one network card or port per virtual machine on each host.
d. Ensure that all of the virtual machines are configured with the same VLAN so that they can all communicate with one another.

Answers

b. ensure that he has enough IP addresses for the networks and subnets to account for the vNICS that are in bridging mode.

To dynamically change a reference line using parameter action, you first create a reference parameter. Next, add a parameter action for it. Finally, _____.a. add a reference line whose value follows a reference parameter.b. add the sheet you want to control as the bottom-right element in the layout.c. also add a URL action that points to the dashboard itself.d. add a reference line with a per pane scope and a tooltip.

Answers

Answer:

a. add a reference line whose value follows a reference parameter

Explanation:

To dynamically change a reference line using parameter action, you first create a reference parameter. Next, add a parameter action for it. Finally, "add a reference line whose value follows a reference parameter."

This is because to dynamically change a reference line using parameter action, one needs to do the following:

1. Attribute the reference line with a parameter

2. Utilize a parameter action to make the parameter interactive.

3. As your users interact with the view, the reference lines automatically update to deliver more context to the data.

Answer:

add a reference line whose value follows a reference parameter

Explanation:

add a reference line whose value follows a reference parameter

Other Questions
Can anyone help me with this? wuzzle puzzle: Senten.....PLEASE HELP IM ALMOST DONE WITH THIS CLASS Breast milk is naturally formulated to meet the nutritional needs of a growing infant.a. Trueb. False What is the value of x that makes l1||l2?A. 15B. 25C. 18D. 29 Find mF.Find the answer to mF How many goals and destinations are determined by the General Assembly of the United Nations? An oligopolistic market structure is distinguished by several characteristics, one of which is either similar or identical products. Which of the following are other characteristics of this market structure?a. Market control by many small firmsb. Difficult entryc. Mutual interdependenced. Market control by a few large firmse. Mutual dependence An important consideration in experience design is the degree of personal engagement and intimacy customers prefer in their journey with your offerings and brand. Wedding planners who spend time meeting with couples and their families in an effort to develop a highly personal, customized service are pursuing a __________________ approach to customer experiences. How would the following triangle be classified?O scalene acuteO scalene obtuseO isosceles acuteO isosceles obtuse Translate the following into an algebraic expression:The number that is 75% of one less than a number n. Yesterday, Kofi earned 50 cedis mowingLawns. Today, Kofi earned 60% of what heearned yesterday moving lawns - How muchMoney did kojo earn moving laws today? What literary devices are used in the sentence "What was once the furthest outpost on the old frontier of the West will be the furthest outpost on the new frontier of science and space. The options are Alliteration, Rhyme, Analogy, Imagery, and Parallelism Whats an antonym for the word imperialism? A right triangle has a 12in base and an 8in height. What is the area of the triangle, in in?? what is the standardform of R(4, 0), m = 5 [tex]5(x-6)+3=3/4(2x-8)[/tex] Type the correct answer in each box. Spell all words correctly.Digital artist Frank is discussing how to enhance scanned or photographed images. Complete the following sentences while keeping in mind the topic of discussion.You can rework or enhance scanned or photographed images using photo editing and illustration software or by using a digital____. The device has a_____surface on which you can draw images, graphics, and animations. The ants were climbing up the wall of the house. (Identify the verb and its tense) Find each of the following products a) 6x * (-2y)Answer ) -12xy can somebody help what's wrong with this codeasap~