1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jeka94
3 years ago
5

Why is the protocol down, even though you issued the no shutdown command for interface vlan 99?

Computers and Technology
2 answers:
Svet_ta [14]3 years ago
8 0

At least one device needs to be assigned to a Vlan 99 to bring the protocol up. Assuming that the Status is UP and the protocol is DOWN may mean that there are no ports assigned to Vlan 99 and thus no host assigned to this Vlan.






Blizzard [7]3 years ago
6 0

Answer and explanation:

The protocol of a management interface with VLAN 99 could be "down" because there are no ports assigned to it, meaning there are no hosts assigned to that interface. In this case, the status of the interface can be displayed as "up" regardless of the protocol.

You might be interested in
Five indicators of computer illiteracy​
melisa1 [442]

1. Isn't fluent in "geek language"

2. Doesn't know how to use a web browser and it's features

3. Doesn't understand what a computer is and how it works

4. Doesn't know the basic parts of computer hardware

5. Doesn't know how to use a computer or any other electronics

8 0
3 years ago
A software engineer with a detail oriented personality has the patience and aptitude for
AnnZ [28]

Answer is: looking through many lines of code for errors that cause bugs



Explanation:

A software engineer with a detail oriented personality has the patience and aptitude for  looking through many lines of code for errors that cause bugs


Because software writes many lines of code for developing different application so he has to go through through many lines of code for errors that causes a bug or errors.

I hope you got the idea and answer thanks.

5 0
2 years ago
Once goals and objectives are clearly defined, what should a successful company do next in its content strategy?
Usimov [2.4K]

Answer:

An effective Content Marketing strategy must have four core elements to be successful: brand positioning, owned media value proposition, business case, and strategic plan. Let's see why these elements are essential for Content Marketing and how you can start implementing each of them.

Explanation:

mark me as brainlist..

8 0
2 years ago
Read 2 more answers
Create a map using the Java map collection. The map should have 4 entries representing students. Each entry should have a unique
Angelina_Jolie [31]

Answer:

In Java:

import java.util.*;  

public class Main{

   public static void main(String[] args) {

       Map<String, String> students = new HashMap<>();

       students.put("STUD1", "Student 1 Name");

       students.put("STUD2", "Student 2 Name");

       students.put("STUD3", "Student 3 Name");

       students.put("STUD4", "Student 4 Name");

       for(Map.Entry m:students.entrySet()){  

           System.out.println(m.getKey()+" - "+m.getValue());    }  

}}

Explanation:

This creates the map named students

       Map<String, String> students = new HashMap<>();

The next four lines populates the map with the ID and name of the 4 students

<em>        students.put("STUD1", "Student 1 Name");</em>

<em>        students.put("STUD2", "Student 2 Name");</em>

<em>        students.put("STUD3", "Student 3 Name");</em>

<em>        students.put("STUD4", "Student 4 Name");</em>

This iterates through the map

       for(Map.Entry m:students.entrySet()){  

This prints the details of each student

           System.out.println(m.getKey()+" - "+m.getValue());    }  

4 0
2 years ago
Hi, we need a Shinso for our fun RP on MHA :) (It's on p a d l e t by the way)
n200080 [17]
Thank you but no. Mind helping me out with my problem?
3 0
3 years ago
Other questions:
  • Which of the following is not considered as part of technology literacy?
    8·1 answer
  • A/an ___________ is a scheduling tool that sets the standard and nonworking time for the project and is used to assess how tasks
    6·1 answer
  • You open a web page and log into your email. The traffic travels over many routers. What protocol will the routers use to determ
    6·1 answer
  • Which type of link is normally used to interconnect two peripheral modules (pm) in the digital multiplex system (dms)?
    13·1 answer
  • What is the black oval for on the back of an ipod touch for?
    14·1 answer
  • Write a SELECT statement that returns a single value that represents the sum of the largest unpaid invoices submitted by each ve
    5·1 answer
  • What is a feature of readable code?
    12·2 answers
  • Which of these might be an example of an advertiser's target group?
    12·2 answers
  • Create a program that simulates a race between several vehicles. Design and implement an inheritance hierarchy that includes Veh
    11·1 answer
  • ______________________ can run on a workstation or server and is at the heart of all business applications.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!