1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denpristay [2]
3 years ago
15

 A network engineer is examining a configuration implemented by a new intern who attached an IP phone to a switch port and confi

gured the switch. Identify the issue, if any, with the configuration
(a) the switch port is not configure as a trunk
(b) the configure is correct
(c) the spanning tree bpdu guard feature is missing
(d)there must be a data vlan added
(e) the voice vlan should be 150
Computers and Technology
1 answer:
lakkis [162]3 years ago
7 0
Where is the answer?????????

You might be interested in
You want to allow members of the users group to use fdisk on the /dev/sda drive (and only that drive) and to use the yum command
masya89 [10]

Answer:

su ,sg and sudo command.

Explanation:

Whenever the user needs to enable workgroup mates should use fdisk including just that disk on both the /dev / sda disk, using the following command to update and configure the following packages. Thus he uses the command su, sg, and sudo.

So, the following commands are required according to the following statement.

6 0
3 years ago
What is one important feature of an AUP?
rusak2 [61]

Answer:

A clear outline of the consequences of violating the policy  is the correct answer to this question.

Explanation:

AUPs are used by schools and universities, corporations, businesses, internet and hosting service providers, and website owners. An acceptable use of policy in AUP helps in many ways:

  • Online platforms and applications require users to sign the policy before granting access to any information database, online shop, or other networks.
  • An acceptable use policy helps in reducing risk when it comes to online safety, decreased productivity, and damage to both the company and the users.
  • One of the main reasons why an acceptable use policy is important is to ensure the safety of users.
  • Use of policy is also known as fair use policy.It is set of rules applied by the owner of the network or website.
8 0
3 years ago
Specification of database requirements falls under which category of database​ administration?
enot [183]
Specification of database requirements falls under which category of database​ administration?

b. development
3 0
4 years ago
Which statement describes the primary purpose of JavaScript?
cupoosta [38]

a.The primary purpose of JavaScript is to enable features such as validation of forms before they are submitted to the server.

<u>Explanation:</u>

On web pages before submitting the day, end user has to do client validations such as whether data enter is correct data type,  so end user for  client side validation been eiher by VBSCRIPT (visual basic script language) or (JavaScript java script).  Internet explorer or Microsoft edge uses VBSCRIPT for web page validation.

For visual basic script languages end user should have enough knowledge   on visual basic programming languages. Same away for java script end user have enough knowledge on c language.

Both Scripts are used for client side validation on success of validation end user will submit web page form for next action. JavaScript is used in most of the browser including Microsoft explorer or Microsoft edge.

5 0
3 years ago
Write the program to solve quadratic equations, but if the discriminant is negative, output
Firdavs [7]

Answer:

PROGRAM  QuadraticEquation Solver

  IMPLICIT  NONE

REAL :: a, b, c ;

  REA :: d ;

  REAL  :: root1, root2 ;

//read in the coefficients a, b and c

  READ(*,*)    a, b, c  

  WRITE(*,*)   'a = ', a

  WRITE(*,*)   'b = ', b

  WRITE(*,*)    'c = ', c

  WRITE(*,*)

// computing the square root of discriminant d

  d = b*b - 4.0*a*c

  IF (d >= 0.0) THEN              //checking if it is solvable?

     d     = SQRT(d)

     root1 = (-b + d)/(2.0*a)     // first root

     root2 = (-b - d)/(2.0*a)     // second root

     WRITE(*,*)  'Roots are ', root1, ' and ', root2

  ELSE                            //complex roots

     WRITE(*,*)  'There is no real roots!'

     WRITE(*,*)  'Discriminant = ', d

  END IF

END PROGRAM  QuadraticEquationSolver

8 0
3 years ago
Other questions:
  • How to upload themes to chrome web store
    11·1 answer
  • ____ refers to data, applications, and even resources stored on computers accessed over the Internet. Answer
    5·1 answer
  • 18. Applying what formatting option to your Excel workbook will make it easier to read when printed out?
    9·1 answer
  • How do you measure objects and re-size them in tinkercad? I need it in steps.
    7·1 answer
  • The following program segment is designed to compute the product of two nonnegative integers X and Y by accumulating the sum of
    9·1 answer
  • PLEASE HELP ASAP<br> Which technology encrypts traffic between a web browser and a website?
    10·2 answers
  • How to be good at photography?
    5·2 answers
  • Where do you define parameter variables?
    14·1 answer
  • 1. Write an if statement that assigns 20 to the variable y, and assigns 40 to the variable z
    10·1 answer
  • How many questions do you have to answer before you can use direct messages on Brainly?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!