Internet Security Questions
What is the purpose of the command, ping 127.0.0.1? To verify that TCP/IP is configured correctly.
Thinking Critically 1. You have just installed a network adapter and have booted up the system, installing the drivers. You open My Network Places on a remote computer and don’t see the computer on which you just installed the NIC. What is the first thing you check? a. Is File and Printer Sharing installed? b. Is the NetBEUI protocol installed? c. Are the lights on the adapter functioning correctly? d. Has the computer been assigned a computer name?
Answer: c. Are the lights on the adapter functioning correctly? 2. You work in the Accounting Department and have been using a network drive to post Excel spreadsheets to your workgroup as you complete them. When you attempt to save a spreadsheet to the drive, you see the error message, “You do not have access to the folder ‘J:\’. See your administrator for access to this folder.” What should you do first? Second? a. Ask your network administrator to give you permission to access the folder. b. Check My Network Places to verify that you can connect to the network. c. Save the spreadsheet to your hard …show more content…
Linda has been assigned the job of connecting five computers to a network. The room holding the five computers has three network ports that connect to a switch in an electrical closet down the hallway. Linda decides to install a second switch in the room. The new switch has four network ports. She uses one port to connect the switch to a wall jack. Now she has five ports available (two wall jacks and three switch ports). While installing and configuring the NICs in the five computers, she discovers that the PCs connected to the two wall jacks work fine, but the three connected to the switch refuse to communicate with the network. What could be wrong and what should she try