1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vichka [17]
3 years ago
8

26. A network administrator is looking to expand the available bandwidth of his extranet remote branch by adding another leased

line. The ISP has notified the administrator that another physical serial connection will need to be added to his gateway router. Which of the following will realise this?
A. Add a distribution layer card into the router allowing another gigabit ethernet port.
B. Add a layer 3 switch into the network.
C. Install a WAN interface card with appropriate interface connectors to the
router.
D. Multiplex the existing serial using the appropriate commands in the config
file.



27. What happens after configure a rule with IP address 0.0.0.0 and wildcard mask 255.255.255.255?
A. This is default configuration B. Block all IP address
C. Allow all IP addresses
D. Nothing will happens
Computers and Technology
1 answer:
Talja [164]3 years ago
5 0

The option that will realize the above case is that  Add a distribution layer card into the router allowing another gigabit ethernet port.

<h3>How do one  Increase Bandwidth on Router</h3>

The steps are:

  • Alter the Router's Location.
  • Then Reboot your Router.
  • Have a Dual-bandwidth Router.
  • Then do Update the Router's Firmware.

So therefore, The option that will realize the above case is that  Add a distribution layer card into the router allowing another gigabit ethernet port.

Learn more about expanding bandwidth from

brainly.com/question/25898149

#SPJ1

You might be interested in
What type of data causes concern for institutions are businesses Lincoln elected stored and not secured properly
Kobotan [32]

The type of data which causes concern for institutions or business when collected, stored, and not secured properly is Personal Identifying Information. The correct option is B.

<h3>What is personal identifying information?</h3>

A personal identifying information is the representation of data or information  of an individual that can be used to identify an individual specifically.

Some examples of a personal identifying information includes Social security number (SSN), E-mail address, Driver's license number. Bank account number, Full name and Passport number.

Business organizations should secure personal identifying information  properly, in order to avoid unauthorized access by hackers.

Thus, the correct option is B.

Learn more about personal identifying information.

brainly.com/question/4997276

#SPJ1

6 0
2 years ago
A disadvantage of online surveys is that _________. a. it is difficult to access large numbers of potential respondents. b. they
Minchanka [31]

Answer:

B seems like the best answer to me.

Explanation:

7 0
4 years ago
The spellchecker can be found in which two locations in most wordprocessing software?
bogdanovich [222]
Editing tab or in the same section as the find comand
8 0
4 years ago
I will give Brainliest to whoever answers correctly :3
Naya [18.7K]

Answer:

1,3,4

Explanation:

They all make sense except for 2. They cannot advertise or state something that is not to guaranteed to happen.

6 0
3 years ago
Suppose as a computer programmer, you have been assigned a task to develop a program to store the sorted data in ascending order
shepuryov [24]

Answer:

In case the data is arranged in the ascending order, you can always change the Binary search tree into a Height BST, and which is also known as the self-balancing BT. And through this, it's quite on hand to better the operations like searching on the new BST. And these SBBTs are quite commonly made use of for constructing as well as maintaining the ordered list. This is the case in the case of the priority queue, and this is what is required here.

Explanation:

Please check the answer.

3 0
4 years ago
Other questions:
  • Many people use Wikipedia as a reference for computing papers, and getting additional information about a topic. How reliable is
    15·1 answer
  • What is the first document that colleges review when making admissions decisions
    10·2 answers
  • Which is the best practice for placing graphics on a slide?
    6·2 answers
  • Which resource hels a user access a could service​
    12·1 answer
  • A look to different section of the same page is known as_____.
    7·1 answer
  • Bob gets an e-mail addressed from his bank, asking for his user ID and password. He then notices that the e-mail has poor gramma
    6·1 answer
  • My PC won't output any data does anyone have any ideas​
    9·1 answer
  • Which of the following would not be stored in a cell ?
    14·1 answer
  • True or false<br>Y axis is also known as the value X.​
    9·2 answers
  • Adding a border to an image is one way to manipulate media to spice up a project. Where do you find the Picture Styles command t
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!