Determine potential causes of the problem

Assignment Help Operating System
Reference no: EM1379630

Question: A user calls to report that she is unable to log on to email. You respond with a couple of quick questions. Because you know that no one else is using the network right now, you cannot determine whether the problem is unique to her machine or affects the entire network. Probing further, you also learn that she is unable to print. You decide that the problem is probably easier to troubleshoot from the user's computer. Outline the items you must check and the questions you must ask when you arrive at the user's office. Based on the possible responses to your questions, describe the actions you will take to correct the potential causes of the problem.

Reference no: EM1379630

Questions Cloud

Separation of a lan from the outside world : Discuss how may two routers be used to give separation of a LAN from the outside world?
Benefits of the just in time inventory management system : Determine what does just in time inventory management have to do with the Carle Heart Center in Urbana, Illinois?
Discussion about wireless networking technologies : Your corporation has just occupied an old historic building in which fifteen workers will work. Due to historic building codes, the corporation is not permitted to run cables inside walls or ceilings.
Creating a boardroom quality microsoft : Construct a plan to set up a local area network based on the scenario given in Appendix A. Prepare a boardroom-quality Microsoft?
Determine potential causes of the problem : A user calls to report that she is not able to log on to email. You respond with a couple of quick questions. Because you think that no one else is using the network right now,
Advantages of home networking : Discuss the advantages of home networking? Do you find that most of the documents are actually stored on a single computer.
Television clips in a powerpoint presentation : Computers and television would work is when you tape television demonstrate that can be used to give flavor to PowerPoint Presentations.
Mobile users and enterprise security : The Baypoint Group requires your help with a presentation for Academic Computing Services, a nationwide company that assists colleges and universities with technology issues.
Solving hub issue : Linda has been asked the job of connecting 5-computers to a network. The room holding 5-computers has 3-network ports that connect to a hub in an electrical closet down the hallway.

Reviews

Write a Review

Operating System Questions & Answers

  Change current operating system of plant

The software house has been contacted by a Governmental Nuclear Reactor Agency that wants to change the current Operating System of their plant.

  Question about internet usage

Do you think that an workers internet usage at a corporation should be audited and governed through usage policy?

  Formulate the linear programming model for this problem

Formulate the linear programming model for this problem Plot a graph indicating and labelling clearly all the constraints, the feasible region (R) and the optimal point (X)

  Explaining first-in-first-out scheduling

Qqueue for service (if the server process is busy servicing another request). Requests in queue are served according to the scheduling policy in use: First-In-First-Out (FIFO) scheduling.

  Compute average seek time and rotational latency

Seek time 1 ms for every 100 tracks traversed. Initial track position is 0. Compute average seek time & rotational latency.

  Difference between an exclusive lock and a shared lock

Describe the difference between an exclusive lock and a shared lock. Define deadlock and how can it be avoided? How can it be resolved once it occurs?

  Protecting the company data

Suppose you work for a small, one office loan business. Your data is critical, and a fire or other disaster could destroy all of your computer documents.

  Simulating operating systems scheduling

Simulate the long-term scheduler, the short-term scheduler and the I/O scheduler of the computer using the First-Come-First-Serve algorithm.

  Discuss an application that benefits barrier synchronization

Discuss an application that would benefit from the use of barrier synchronization

  Information-level design for college requirements

Database at college is needed to support following requirements. Complete information-level design for this set of requirements. Use your own experience to find out any constraints you require which are not stated in problem

  Integrity without confidentiality

Determine the difference between message confidentiality and message integrity? Can you have confidentiality without integrity?

  Write bash shell script for number files in directories

Write a bash shell script filestatic. The script should examine the number files in directories given as arguments (parameters) to this script.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd