1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Schach [20]
3 years ago
5

Linda has been assigned the job of connecting five computers to a network. the room holding the five computers has three network

jacks that connect to a switch in an electrical closet down the hallway. linda decides to install a second switch in the room. the new switch has four network ports. she uses one port to connect the switch to a wall jack. now she has five ports available (two wall jacks and three switch ports). while installing and configuring the nics in the five computers, she discovers that the pcs connected to the two wall jacks work fine, but the three connected to the switch refuse to communicate with the network. what could be wrong and what should she try next?
Computers and Technology
1 answer:
Lubov Fominskaja [6]3 years ago
8 0
<span>First, Linda should check if the problem is at the computer or at the switch. She should try to connect one of the non-working computers to a wall jack. If the computer communicates with the network, then the problem is: the switch, the cable connecting the switch to the wall jack, or the wall jack the switch is using.
So, next she should connect the switch to a jack that is 100% working. If it is ok, than the problem is the jack or the cable. She should replace the cable with new one. If it is OK, then the problem is the jack.

</span>
You might be interested in
. What is an APT? What are some practical strategies to protect yourself from an APT?
viva [34]

Answer and Explanation:

Advanced Persistent Threat abbreviated as APT is a type of cyber attack which gives access to the unauthorized user  to enter the network without being detected for a long period.

APTs are generally sponsored by the government agencies of the nation or large firms. For example, one of the ATPs used was Stuxnet in the year 2010 against Iran, in order to put off the nuclear program of Iran.

Some of the practical strategies for protection against APT are:

  • Sound Internal Auditing
  • Strong Password Accessing Policies
  • Stringent policies for accessing any device
  • Introduction and implementation of multi factor authentication
  • Strong IDs and sound honeypot solutions
3 0
3 years ago
If your vehicle has fuel injection and the engine is cold,
olga nikolaevna [1]
D. Press the accelerator to the floor once and release it.
6 0
3 years ago
In bankruptcy, most of a debtor’s assets will probably be used to repay unsecured debt
Juli2301 [7.4K]
This is true. A person in debt could have everything from their home to vehicles to even boats and other possessions taken in order to make up for the money owed. 
5 0
3 years ago
Which group on the Home Ribbon allows you to create bulleted and numbered lists in a PowerPoint presentation?
igomit [66]
You gotta do the paragraph group its that one
3 0
3 years ago
Read 2 more answers
Random Star
Tatiana [17]

Answer:

Explanation:

The following code is written in Java. The function takes in the random object and creates a random number where it generates a random number and prints out the * characters, if the random number and the input num are the same it prints out both values and ends the function.

import java.util.Random;

class Brainly {

   public static void main(String[] args) {

       Random r = new Random();

       randomStar(r, 12);

       System.out.println();

       randomStar(r, 19);

   }

   public static void randomStar(Random r, int num) {

       while (true) {

           int randomNum = r.nextInt(19) + 5;

           if (randomNum != num) {

               for (int x = 0; x < randomNum; x++) {

                   System.out.print("*");

               }

               System.out.print("\n");

           } else {

               for (int x = 0; x < randomNum; x++) {

                   System.out.print("*");

               }

               System.out.print("\n");

               System.out.println("Random Number: " + randomNum);

               System.out.println("Input Number: " + num);

               break;

           }

       }

   }

}

3 0
3 years ago
Other questions:
  • _____ is a function performed by control programs that manages computer resources, such as storage and memory.
    11·1 answer
  • Which button is used to open the Start menu in Windows Vista?
    14·1 answer
  • Write the 8-bit signed-magnitude, two's complement, and ones' complement representations for each decimal number: +25, + 120, +
    11·1 answer
  • Select the instances in which you should include a comma.
    14·1 answer
  • Write a program which reads in a single integer 0 &lt;= n &lt; 30 and prints out the factorial of n. Factorials get very big ver
    9·2 answers
  • if you were writing an essay about the major rivers of America which illustration would be the most helpful to your reader ​
    14·1 answer
  • what will allow you to immediately exit the program without rebooting the computer, when you realize your browser is not respond
    7·1 answer
  • Which software programs should students avoid using to create and submit course work? (Choose all that apply.
    15·1 answer
  • How do you get Brainliest on a question?
    5·2 answers
  • In Python, when do we use the str( ) function
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!