You work in an office that uses Linux and Windows servers. The network uses the IP protocol. You are sitting at a Windows workstation. An application you are using is unable to connect to a Windows server named FileSrv2. Which command can you use to determine whether your computer can still contact the server?

Answers

Answer 1
Answer:

Answer:

PING

Explanation:

To check if there's still connectivity between the computer and server, I would use the ping command.

The ping command is primarily a TCP/IP command. What this command does is to troubleshoot shoot. It troubleshoots connection and reachability. This command also does the work of testing the name of the computer and also its IP address.


Related Questions

Given six memory partitions of 100 MB, 170 MB, 40 MB, 205 MB, 300 MB, and 185 MB (in order), how would the first-fit, best-fit, and worst-fit algorithms place processes of size 200 MB, 15 MB, 185 MB, 75 MB, 175 MB, and 80 MB (in order)? Indicate which—if any—requests cannot be satisfied. Comment on how efficiently each of the algorithms manages memory.
Which Numpy function do you use to create an array? (Points : 1) npnp.arraynp.numpynumpy
Many organizations have policies that require users to: a. retain their passwords for a minimum of 30 days. b. include at least three consecutive letters of part of their name in their passwords. c. change their passwords on a regular basis. d. share their passwords with the administrator.
A customer has engaged your software development company to develop a new order-processing system. However, the time frames are very tight and inflexible for delivery of at least the basic part of the new system. Further, user requirements are sketchy and unclear. a. What is the best system development strategy that might be advantageous to use in this engagement? b. What is the potential downside to using the strategy described in the part a?
A data structure used to bind an authenticated individual to a public key is the definition of ________. digital certificate baseline internet layerdata link layer

Which of these terms best describes the type of AI used in today’s email spam filters, speech recognition, and other specific applications?A. Artificial Narrow Intelligence (ANI)
B. Artificial General Intelligence (AGI)

Answers

The term that is described in the question is A. Artificial Narrow Intelligence.

Artificial intelligence simply means the ability of a computer system to automatically make decisions based on the input value received.

Artificial Narrow Intelligence is the computer's ability to do a single task well. It's used in today’s email spam filters, speech recognition, and other specific applications.

Read related link on:

brainly.com/question/16439202

Answer:

A. Artificial Narrow Intelligence.

Explanation:

Artificial intelligence is the ability of a computer system, with the help of programming, automatically make decisions as humanly as possible, based on the input value received. There are three types of artificial intelligence, namely, artificial narrow intelligence (ANI), artificial general intelligence (AGI) and artificial super intelligence (ASI).

ANI is focus on executing one specific task extremely well like web crawler, speech recognition, email spam filters etc. AGI is meant to handle human intellectual task, while ASI performs task beyond human intellect.

What is the purpose of creating a PST file?Question 18 options:
a)To document an antivirus pattern that continues to be sent to your mailbox
b)To insert as a Signature for all outgoing emails
c) To save your emails so that you can restore your mailbox if necessary
d)To create a file that deleted emails will be sent to for deletion

Answers

The purpose of creating a PST file is to

c) To save your emails so that you can restore your mailbox if necessary

Explanation:

  • A PST file is a personal folder file in Microsoft Outlook. In Outlook, the storage limit for a single user's . PST file is 2 GB. PST stands for personal storage.
  • A PST file, or personal storage table (. pst) file, is a Microsoft Outlook Data File that stores a user's Outlook data for POP3, IMAP and web-based mail accounts, including all mail folders and the items within the folders, such as emails, email attachments, to do items and appointments, contacts and more.
  • In computing, a Personal Storage Table (. pst) is an open proprietary file format used to store copies of messages, calendar events, and other items within Microsoft software such as Microsoft Exchange Client, Windows Messaging, and Microsoft Outlook.
  • The purpose of the PST file was, like it is today, to provide end users with a way to create local archives of their server-based email.
  • As a result, PST files provided end users with a means of expanding their email storage by creating and maintaining one or more local archives.

Suppose you are the security manager of a company and one of your goals is to design security mechanisms based on three security goals (1) prevent the attack (2) detect the attack or (3) recover from the attack. Depending on the situation or application, you have to adopt one of these security goals. For each of the following statements, give an example of an application or situation in which the statement is true. (i). Prevention is more important than detection and recovery
(ii). Detection is more important than prevention and recovery
(iii). Recovery is more important than prevention and detection

Answers

Answer:

(i) Prevention is more important than detection and recovery.

(ii) Detection is more important than prevention and recovery.

(iii) Recovery is more important than prevention and detection.

Explanation:

(i) Prevention is more important than detection and recovery.

Prevention of attack can be through various applications for example a walk through gates are placed in order to prevent any attacker from entering the premises and causing harm.

(ii) Detection is more important than prevention and recovery.

Detection of an attack can be done through for example a security alarm can detect an attack and inform others.

(iii) Recovery is more important than prevention and detection.

Recovery of an attack can be done by for example an insurance which will recover a portion of loss occurred during the attack.

Answer: A prevention

Explanation:

You can alway's prepare for someone by preventing from doing something but you can't detection something right away it is not h3cked and you can't recover something that is not detected

Language: JavaYour task is to complete the logic to manage a twenty-four-hour clock (no dates, just time) that tracks
the hours, minutes, and sections, and various operations to adjust the time. The framework for your
clock is in the Time class with the four methods you must complete.
1.) advanceOneSecondâ A user calls this method to advance the clock by one second.
a. When the seconds value reaches 60, it rolls over to zero.
b. When the seconds roll over to zero, the minutes advance.
So 00:00:59 rolls over to 00:01:00.
c. When the minutes reach 60, they roll over and the hours advance.
So 00:59:59 rolls over to 01:00:00.
d. When the hours reach 24, they roll over to zero.
So 23:59:59 rolls over to 00:00:00.
2.) compareTo â The user wants to know if a second time is greater than or less than the time
object called, assuming both are on the same date.
a. Returns -1 if this Time is before otherTime.
b. Returns 0 if this Time is the same as otherTime.
c. Returns 1 if this Time is after otherTime.
3.) add â Adds the hours, minutes, and seconds of another time (the offset) to the current time
object. The time should ârolloverâ if it exceeds the end of a 24 hour period.
4.) subtract â Subtracts the hours, minutes, and seconds of another time (the offset) from
the current time object. The time should âroll backâ if it precedes the beginning of a 24 hour
period.
________________________________________________________________________
package clock;
/**
* Objects of the Time class hold a time value for a
* European-style 24 hour clock.
* The value consists of hours, minutes and seconds.
* The range of the value is 00:00:00 (midnight) to 23:59:59 (one
* second before midnight).
*/
public class Time {
private int hours;
private int minutes;
private int seconds;
/**
* Add one second to the current time.
* When the seconds value reaches 60, it rolls over to zero.
* When the seconds roll over to zero, the minutes advance.
* So 00:00:59 rolls over to 00:01:00.
* When the minutes reach 60, they roll over and the hours advance.
* So 00:59:59 rolls over to 01:00:00.
* When the hours reach 24, they roll over to zero.
* So 23:59:59 rolls over to 00:00:00.
*/
public void advanceOneSecond()
{
}
/**
* Compare this time to otherTime.
* Assumes that both times are in the same day.
* Returns -1 if this Time is before otherTime.
* Returns 0 if this Time is the same as otherTime.
* Returns 1 if this Time is after otherTime.
*/
public int compareTo(Time otherTime)
{
return 0;
}
/**
* Add an offset to this Time.
* Rolls over the hours, minutes and seconds fields when needed.
*/
public void add(Time offset)
{
}
/**
* Subtract an offset from this Time.
* Rolls over (under?) the hours, minutes and seconds fields when needed.
*/
public void subtract(Time offset)
{
}

Answers

Using the knowledge in computational language in JAVA  it is possible to write a code that user calls this method to advance the clock by one second. When the seconds value reaches 60, it rolls over to zero.

Writting the code:

public class Time

{

   private int hours;

   private int minutes;

   private int seconds;

   

   public void advanceOneSecond()

   {

      seconds++;

      if(seconds >= 60)

      {

             seconds -= 60;

             minutes++;

      }

      if(minutes >= 60)

      {

             minutes -= 60;

             hours++;

      }

      if(hours >= 24)

             hours -= 24;

   }

   

   public int compareTo(Time otherTime)

   {

      if(hours > otherTime.hours)

             return 1;

     

      else if(hours < otherTime.hours)  

             return -1;

      else

      {

             if(minutes > otherTime.minutes)

                    return 1;

             else if(minutes < otherTime.minutes)

                    return -1;

             else

             {

                    if(seconds > otherTime.seconds)

                           return 1;

                    else if(seconds < otherTime.seconds)

                           return -1;

                    else

                           return 0;

             }

      }

   }

   

   public void add(Time offset)

   {

      seconds += offset.seconds;

      minutes += offset.minutes;

      hours += offset.hours;

      if(seconds >= 60)

      {

             seconds -= 60;

             minutes++;

      }

      if(minutes >= 60)

      {

             minutes -= 60;

             hours++;

      }

      if(hours >= 24)

             hours -= 24;

   }

   

   public void subtract(Time offset)

   {

      if(offset.seconds > seconds)

      {

             minutes--;

             seconds = seconds + 60;

      }

      seconds -= offset.seconds;

      if(offset.minutes > minutes)

      {

             hours--;

             minutes = minutes + 60;

      }

      minutes -= offset.minutes;

      if(offset.hours > hours)

      {

             hours += 24;

      }

      hours -= offset.hours;

   }

}

See more about JAVA at brainly.com/question/18502436

#SPJ1

What character makes an assignment statement an assignment statement?

Answers

Answer:

'='

Explanation:

The equal ('=') is the character that is used to assign the value in the programming.

In the programming, there is a lot of character which has different meaning and uses for a different purpose.

like '==' it is used for checking equality between the Boolean.

'+' is a character that is used for adding.

'-'  is a character that is used for subtraction.

similarly, '=' used for assigning.

for example:

a = a + b;

In the programming, the program evaluates the (a + b) first and then the result assigns to the variable.

If you have a list consisting of just numbers, then you can add all of the values in the list using the sum() function. If your list consists of some numbers and some values of other types (e.g., lists, strings, sets), the sum() function will fail. In this question, we're asking you to write a function that will sum all of the numbers in a list, ignoring the non-numbers. The function below takes one parameter: a list of values (value_list) of various types.


The recommended approach for this:

(1) create a variable to hold the current sum and initialize it to zero,

(2) use a for loop to process each element of the list,

(3) test each element to see if it is an integer or a float, and, if so, add its value to the current sum,

(4) return the sum at the end.


student.py 1


Hef sum_lengths(value_list):

# Implement your function here. Be sure to indent your code block! Restore original file

Answers

Answer:

See explaination

Explanation:

def sum_lengths(value_list):

total = 0

for x in value_list:

if (type(x)==int) or (type(x)==float):

total += x

return total