1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sunny_sXe [5.5K]
2 years ago
6

you're building a new network for a small financial services startup company. security is paramount, so each organization within

the company will have their own network segments separated by routers. funds are limited, and you've been asked to keep costs to a minimum. you've acquired a used fiber optic switch, and you want to use it to create a fiber optic backbone that interconnects all of the routers. you've purchased several used multi-mode gbic modules on ebay that you'll install on each router to allow them to connect to the switch.
Computers and Technology
1 answer:
Elena L [17]2 years ago
4 0

Since  both switch and the GBIC modules use MTRJ connectors and if a person use this to connect each module to the switch with 1 meter multimode patch cables. I will say that my response is NO, this  implementation will not work.

<h3>Why would the above implementation not work?</h3>

The reason is that a person  is not permitted to use multimode patch cables with  one or single mode GBIC modules as this is ideal.

<h3>Is GBIC still used?</h3>

Not as before, the use of GBIC is known to be considered as old or obsolete, a

The gigabit interface converter, which is GBIC module is said to be a kind of a transceiver that act to converts electric currents to a ay that is known to be optical signals.

Therefore, Since  both switch and the GBIC modules use MTRJ connectors and if a person use this to connect each module to the switch with 1 meter multimode patch cables. I will say that my response is NO, this  implementation will not work.

Learn more about  network segments from

brainly.com/question/7181203

#SPJ1

See full question below

You are building a new network for a small startup financial services company. Security is paramount, so each organization within the company will have its own network segment separated by a router. However, funds are limited, and you have been asked to keep costs to a minimum.

You have acquired a used fiber optic switch and want to use it to create a fiber optic backbone that interconnects all of the routers. You purchased several used single mode GBIC modules on eBay that you will install in each router to allow them to connect to the switch.

Both the switch and the GBIC modules use MTRJ connectors. You connect each module to the switch with 1 meter multimode patch cables.

Will this implementation work?

You might be interested in
What are the programming concepts (within or outside the scope of IT210) that you would like to strengthen and delve into furthe
marin [14]

Answer:

The description for the given question is described in the explanation section below.

Explanation:

I would like to reinforce in advanced or complex concepts such as documents as well as channels, internet programming, multi-threading, after that last lesson.

  • I am interested in learning web development to develop applications or software. I would also like to explore those concepts by using open source tools.
  • Course concepts will have to develop models for handling.
  • No there is no subject matter or definition you provide further clarity for.
  • I'm interested in studying java as well as web development in comparison to C++ so I can use it in my contract work.
4 0
3 years ago
State one device that may be found on a computer monitor that is used for video conferencing
torisob [31]

Answer: Camera and Microphone

Explanation:

This can be  embedded on to the monitor.m

Camera for Visual

Microphone for radio.

5 0
2 years ago
Digital Blank______ track KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs. Mult
aleksklad [387]

Digital Dashboard track KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs.

<h3>What are digital dashboard?</h3>

This is known to be a kind of  an analysis tool that helps a lot of business men and women to be able to examine and analyze their most vital data sources in real time.

Note that Digital Dashboard track KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs.

Learn more about digital dashboard from

brainly.com/question/14383144

#SPJ1

3 0
2 years ago
calculate how much memory is needed to store a foir minute music trackusing the of bytes needed per second from above​
sergeinik [125]

Answer:

1400 bytes

hope that helps!

4 0
3 years ago
When an author produce an index for his or her book, the first step in this process is to decide which words should go into the
Igoryamba

Answer:

import string

dic = {}

book=open("book.txt","r")

# Iterate over each line in the book

for line in book.readlines():

   tex = line

   tex = tex.lower()

   tex=tex.translate(str.maketrans('', '', string.punctuation))

   new = tex.split()

   for word in new:

       if len(word) > 2:

           if word not in dic.keys():

               dic[word] = 1

           else:

               dic[word] = dic[word] + 1

for word in sorted(dic):

   print(word, dic[word], '\n')

                 

book.close()

Explanation:

The code above was written in python 3.

<em>import string </em>

Firstly, it is important to import all the modules that you will need. The string module was imported to allow us carry out special operations on strings.

<em>dic = {} </em>

<em>book=open("book.txt","r") </em>

<em> </em>

<em># Iterate over each line in the book</em>

<em>for line in book.readlines(): </em>

<em> </em>

<em>    tex = line </em>

<em>    tex = tex.lower() </em>

<em>    tex=tex.translate(str.maketrans('', '', string.punctuation)) </em>

<em>    new = tex.split() </em>

<em />

An empty dictionary is then created, a dictionary is needed to store both the word and the occurrences, with the word being the key and the occurrences being the value in a word : occurrence format.

Next, the file you want to read from is opened and then the code iterates over each line, punctuation and special characters are removed from the line and it is converted into a list of words that can be iterated over.

<em />

<em> </em><em>for word in new: </em>

<em>        if len(word) > 2: </em>

<em>            if word not in dic.keys(): </em>

<em>                dic[word] = 1 </em>

<em>            else: </em>

<em>                dic[word] = dic[word] + 1 </em>

<em />

For every word in the new list, if the length of the word is greater than 2 and the word is not already in the dictionary, add the word to the dictionary and give it a value 1.

If the word is already in the dictionary increase the value by 1.

<em>for word in sorted(dic): </em>

<em>    print(word, dic[word], '\n') </em>

<em>book.close()</em>

The dictionary is arranged alphabetically and with the keys(words) and printed out. Finally, the file is closed.

check attachment to see code in action.

7 0
3 years ago
Other questions:
  • Whats the agenda for annual general meeting ??
    10·1 answer
  • The more critical a component or service, the higher the level of availability required. True False
    5·1 answer
  • You can decide if a paint booth filter is hazardous waste by answering which of the following questions: A) Is the paint residue
    12·2 answers
  • Travis sends Suri what purports to be a link to an e-birthday card, but when she clicks on the link, software is downloaded to h
    11·1 answer
  • Suppose you define a java class as follows: public class test { } in order to compile this program, the source code should be st
    14·1 answer
  • Which is most harmful computer virus define​
    15·1 answer
  • How can a System Administrator quickly determine which user profiles, page layouts, and record types include certain fields? Uni
    14·1 answer
  • Private sharing model on Opportunities. Leadership has asked the Administrator to create a new custom object that will track cus
    7·1 answer
  • The Nigerian 4-6-9 scam refers to a fraudulent activity whereby individuals claiming to be from a foreign country will promise a
    11·1 answer
  • Draw a flowchart diagram for a program that display a person's name x times​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!