1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
otez555 [7]
3 years ago
12

You are a network technician for a small corporate network. Today you moved an unused workstation to the IT Administration offic

e, and now you need to connect the computer to the Ethernet local area network and the internet. In this lab, your task is to connect the workstation to the wired network as follows: In the Networking Closet use the appropriate twisted pair cable to make a connection between the patch panel and switch. s Use port IT Adm on the patch panel. Use port 5 on the switch. In the IT Administration office: . Connect the ITAdmin workstation to the local area network using the appropriate . Configure ITAdmin to obtain IP and DNS addresses automatically from the server on . Use the Network and Sharing Center to confirm that the workstation is properly twisted pair cable. the local network. connected to the local area network and the internet.
Computers and Technology
1 answer:
nydimaria [60]3 years ago
4 0

Answer:

Not sure what the question is but because I'm a "show me" type individual and work better hands on, I'll need to be shown once to understand this better.

Explanation:

I don't have experience with this yet but I'm willing to learn and teachable. Need guidance since I usually walked alone or had to make the decisions on my own but not anymore now I have someone who is willing to teach me. I'm thankful and grateful.

You might be interested in
In a virtual memory system, each process must have its own page table.(True or False?)
Anna71 [15]

Answer: True

Explanation:

 Virtual memory is the secondary storage memory and this type of memory are addressed as main part of the memory.

When the virtual memory copying in the physical memory then, at that time the operating system divide the memory into the file page with the address and definite size number. Then, the each page are store in a disk.

When this page are required then, the operating system copy from disk to main memory and then, the virtual address are converted into the  real address.

6 0
3 years ago
What is referred to by the phrase “Web 2.0”?
Tresset [83]

Answer:

Web 2.0

the second stage of development of the World Wide Web, characterized especially by the change from static web pages to dynamic or user-generated content and the growth of social media.

Explanation:

It refers to websites that emphasizes user-generated content, ease of use,  compatible with other products, systems, and devices for end users.

4 0
3 years ago
Use the STL class vector to write a C function that returns true if there are two elements of the vector for which their product
Tema [17]

Answer:

Code is provided in the attachment form

Explanation:

Vector Multiplication code:

Vector_multiplication.c file contains C code.

See attachment no 1 attached below

Classification of Algorithm: For creating elements in vector c of size n, number of scalar  multiplications is equal to n. The size of original two vectors scales directly with the number of  operations. Hence, it is classified as O(n).

7 0
3 years ago
Can someone help me with this please
alex41 [277]

Answer:

D

Explanation:

Filters and the Sort feature can be applied in any order. 

4 0
2 years ago
Help help help help help help
Shkiper50 [21]

Answer:

maybe overexposure???

Explanation:

6 0
2 years ago
Other questions:
  • 1. Which of the following are considered CAD powerhouses?
    6·1 answer
  • The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .
    13·1 answer
  • What possible effects could cyber attack have on Johannesburg stock exchange
    6·1 answer
  • Type the correct answer in the blank. Spell all words correctly.
    13·1 answer
  • What function will delete an element from the end of a deque. On Edge
    13·1 answer
  • Pls help I will give points
    7·1 answer
  • Ok for whoever answers this, Ill wager 20 points...
    11·2 answers
  • The first cell phones in widespread use were . Smartphone technological advancements added services. Answer the following questi
    12·2 answers
  • Who is the owner of apple company??​
    13·2 answers
  • Write a for loop that displays the following numbers exactly like this (you must use a loop):
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!