1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ddd [48]
3 years ago
10

You have configured a lan with 25 workstations three network printers and two servers the workstations and printers will have dy

namically assigned ip addresses and the printers always need to have the same ip address assigned the servers will have static ip addresses what should you instal
Computers and Technology
2 answers:
Elanso [62]3 years ago
7 0
Would introduce and arrange the DHCP which will be utilized to dole out unique IP address and also the DNS server data identified with the workstation and printers. Also, DHCP extension can be designed amid this establishment to arrange the IP deliver range to be utilized by the gadgets in the system, setting the subnet veil, default passage and also the sort of the subnet. I can likewise arrange the server to help IPv6 too amid the establishment procedure. 
Anon25 [30]3 years ago
5 0

Answer:

Dynamic Host Configuration Protocol (DHCP)

Explanation:

Introduce and arrange the DHCP that will be utilized to give out unique IP address and also the DNS server data identified with the workstation and printers. Also, DHCP extension can be designed amid this establishment to arrange the IP deliver range to be utilized by the gadgets in the system, setting the subnet veil, default passage and also the sort of the subnet. One can likewise arrange the server to help IPv6 too amid the establishment procedure.

You might be interested in
I was just called a man in a wig ugh <br><br> Any tips for doxxing someone?
kondaur [170]

Answer:

Explanation:

hope this help

6 0
2 years ago
A bubble starts by comparing the first item in the list to all the remaining items, and swaps where the first item is ____ a lat
Alina [70]

Answer:

greater than

i think

5 0
3 years ago
Read 2 more answers
Samuel is working on decimal and binary conversion for his college project. He is using the binary number 111011 and wants to ex
Contact [7]
<span>1 X 25 + 1 X 24 + 1 X 23 + 0 X 22 + 1 X 21 + 1 X 20 thus your Answer is C</span>
4 0
3 years ago
Read 2 more answers
When a number gets assigned to a variable that already has a value __________?
Aleksandr-060686 [28]
A already assigned variable cannot be assigned twice You can make the variable change over to a new one or call a whole new one to assign one without a value or It might be possible to do v=n (v is variable and n is number / value)
3 0
3 years ago
How do networks help protect data?
klasskru [66]
Network Security. Network Security protects your network from common security threats like viruses, worms, trojans, spyware, adware, identity theft, denial of service attacks and more. To protect yourself you could install an anti-virus/anti-spyware software like Kaspersky or Malwarebytes.
7 0
3 years ago
Other questions:
  • ________ returns the last character in a StringBuilder variable named strBuf? Select one: A. strBuf.charAt(strBuf.length() - 1)
    15·1 answer
  • Jason is creating a webpage on the basic parts of a camera. He has to use a mix of both images and content for the web page to h
    11·1 answer
  • Throwing an improperly drained oil filter into the trash dumpster is a violation that can carry heavy penalties. A) true b) fals
    7·1 answer
  • The ____ dialog box in windows vista appears each time a user attempts to perform an action that can be done only with administr
    12·1 answer
  • An algorithm is defined as a well-ordered collection of unambiguous and effectively computable operations that when executed pro
    10·1 answer
  • . An access specifier is one of three keywords:
    14·1 answer
  • Emma lives in Pennsylvania, what climate does she live in?
    7·1 answer
  • Hewo everyone look at me I look ugly don't I<br>​
    6·2 answers
  • Notes on secondary memory​
    7·1 answer
  • When network traffic is encrypted, it is invisible and its content and purpose are masked.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!