1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guajiro [1.7K]
3 years ago
11

Design and document an IP addressing scheme to meet ElectroMyCycle’s needs. Specify which IP address blocks will be assigned to

different modules of your network design. Document whether you will use public or private addressing for each module. Document whether you will use manual or dynamic addressing for each module. Specify where (if anywhere) route summarization will occur.

Computers and Technology
1 answer:
noname [10]3 years ago
7 0

Answer:

Given that: Design scenario - page 197 has a continuation of the chapter 1 design scenario for ElectroMyCycle

Explanation:

See attached image

You might be interested in
You're setting up some VMs to test an application you're considering making available to employees of the small company you work
IgorLugansk [536]

Answer:

Snapshots in VirtualBox, Hyper-V, and please check explanation.

Explanation:

You should never test the software on your PC as you never know what virus or threat they bring with them. Even when you are a software company and testing your own new software, you should use the VM, as it is safe. Any adverse effect can be tackled as the VM is made to be destroyed some day.

You can install numerous OS on your VM. The two best are certainly Virtual Box and the Hyper-V from VMWare. Remember, if you dont want to use the licensed version of certain OS, the trial versions are always available for free, and you can install them on the VMs.

There is a snapshot option on the VirtuabBOX. You are only required to create the snapshot after creating and configuring the VM. It supports Windows, Linux and Mac. So you can install almost any OS. However, VMWare Player does not support the Snapshot, but it provides s similar option known as Checkpoints. However, VMware Workstation supports Snapshots, though they might be costly.

If you are on OS X you can make use of Parallels.

However, never enable file sharing, and stay away from Bridge mode as well as never use your original accounts. File sharing will inject the malware if any to all places on network. The bridge mode connects the VM directly to the network, which otherwise remain hidden behind NAT. And use of personal accounts can cost you them, and this can be quite a big loss definitely.  

6 0
3 years ago
Read 2 more answers
Brandon purchased a new processor online as an upgrade. When he purchased the processor, he made sure that it used the same sock
LenaWriter [7]

Answer:

The processor and the motherboard goes bad.

Explanation:

Computer system component upgrade allows the enhancement of the component specification. Every computer system comes with a specific quality, size or speed of its various components like the storage drives size, the memory size, the processor speed and even the software components like the operating system.

An upgrade must be compatible with the system configuration like upgrading the processor. If the upgrade is compatible, the processor speed can be increased, but when an upgrade of the processor is not compatible with the chipsets, this could damage the processor and motherboard.

3 0
3 years ago
2. What is data, information, knowledge and data Science? Define the role of data in emerging technology? ​
xz_007 [3.2K]
Answer :
Before answering the question. We look to it in your real life. The minute you wake up and open your eyes, your eyes collect all the information of the room you are in and your brain segregates them depending on the need. So that once you recall that memory it will be already saved in your brain. So your brain is like a computer.
You are collecting data ( information ) of what ever you hear , look and even imagine all day. For extra knowledge, when you put that memory into a form of ( writings , or art if you were an Arabist ) it’s called data visualization.
You are now the data scientist, you collected information form all the surroundings and it’s up to you to display it the way you want but that data must be correct
——
To the real short cut answer

Data , The data is information that is being stored by a computer. This data may be in the sort of text, images, audio clips, software applications, or other varieties of data


Information , information is a term used to describe text that is informative to the individual reading it or the computer processing it.

Or

Information is defined as knowledge gained through study, communication, research, or instruction. Essentially, information is the result of analyzing and interpreting pieces of data. Whereas data is the individual figures, numbers, or graphs, information is the perception of those pieces of knowledge.

Knowledge, In information technology, knowledge is, to an enterprise or an individual, the possession of information or the ability to quickly locate it.


Data science, Data science is the field of applying advanced analytics techniques and scientific principles to extract valuable information from data for business decision-making, strategic planning and other uses.

Your final answer is : Data has the potential to drive better outcomes, processes and of course, new technology that could be the next major industry disruption and breakthrough.”

5 0
2 years ago
A _____ describes two or more computers connected to each other.
WARRIOR [948]

Answer:

Computer network.

Since it is 2 or more computers connected together.

5 0
3 years ago
Read 2 more answers
Suppose the RAM for a certain computer has 256M words, where each word is 16 bits long.What is the capacity of the memory expres
bezimeni [28]

Answer:

The RAM capacity expressed in bytes is

512 million bytes

Explanation:

a) Data and Calculations:

RAM contains 256m words

Each word = 16 bits

1 bit = 0.125 byte

This means that each word will have 2 (16 * 0.125) bytes

Therefore, the RAM contains 256m * 2 = 512 million bytes

b) A bit is 0.125 bytes and a byte is eight times bigger than a bit.  This implies that there are eight megabits in every megabyte, and one gigabyte is eight times bigger than one gigabit.  The 512 million bytes above are about 488.3 gigabytes, since 1 gigabyte equals 1,024 megabytes or 1,046,576 kilobytes.

6 0
3 years ago
Other questions:
  • A(n ____________ is considered a named collection of bytes having persistent or lasting storage.
    10·1 answer
  • A pacing calendar is provided to students so they can:
    8·2 answers
  • Sherri is considering replacing a processor on her laptop. The laptop is running slower than she would like. What should Sherri
    11·1 answer
  • Please check my answer! (Java)
    13·1 answer
  • ____________ is used by IM and other applications that provide voice services over lower-speed digital circuits.
    15·1 answer
  • Why should you avoid the use of sarcasm, clichés, and idioms in business letters?
    11·2 answers
  • Write a program to read a list of exam scores given as integer percentages in the range O to 100. Display the total number of gr
    11·1 answer
  • What is the purpose of the domain name?
    12·1 answer
  • This is for C++: Using a nested for loop output the following pattern to the screen:
    12·1 answer
  • __________(fill in the blank) in online education refer(s) to how online education impacts students of a specific economic group
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!