1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LiRa [457]
4 years ago
15

How to see the range of values of vty lines?

Computers and Technology
1 answer:
PSYCHO15rus [73]4 years ago
7 0

Answer:

To get the range of very lines in a switch or a router, in the global mode, type " line very" and the question mark after the space. It displays the ranges of valid very lines in the device.

Explanation:

Routers and switches are intermediate components of a computer network. They are used to connect various nodes and networks. For a remote connection, they use the virtual interface called vty to connect to computers for management purposes. These vty lines allows for SSH and telnet access from workstations and the range of very lines are predetermined and limited and varies for all switches and routers.

You might be interested in
Select the correct answer from each drop-down menu.
xz_007 [3.2K]

Answer:

Maths operators

cell reference

5 0
3 years ago
Write a definition in your own words for telecommunication. Do not cop and paste please.
34kurt

Answer:

Telecommunication is also known as telecom(s), is the exchange of information over significant distances by electronic means, referring to all types of voice, data, and video transmission. This is a broad term that includes a spacious telecommunication field called the electromagnetic wireless range of technologies and communications infrastructures, such as wired phones; mobile devices, such as cellphones; microwave communications; fiber optics; satellites; radio and television broadcasting; the internet; and telegraphs.

A complete, single telecommunications circuit consists of two stations, each equipped with a transmitter and a receiver. The transmitter and receiver at any station may be combined into a single device called a transceiver. The medium of signal transmission can be via electrical wire or cable -- also known as copper -- optical fiber, electromagnetic fields, or light. The free space transmission and reception of data by means of communications. information  

Explanation:

7 0
3 years ago
What are some of the strategies that you use for confronting a complex problem and breaking it down into smaller pieces? How mig
bazaltina [42]

Answer:

Breaking it down I guess for me, you could take down all the possible things that you could do. Eliminating things, one by one. It could help working on a computer by not letting yourself get over-whelmed by all your programming and thinking "alright, this THEN this."

Explanation:

8 0
3 years ago
um I'm new and I just sign up like right now and brainly says I've reached my daily limit for my questions why?
Natalija [7]

Answer:

Im not sure why but maybe you can find a way to contact the people who own it and see if they know because that hasn't happened to me. How many questions have you asked

Explanation:

7 0
3 years ago
Why have countries requested for the removal of content?
Kipish [7]
These links should help u:
https://support.google.com/transparencyreport/answer/7347744?hl=en

https://searchengineland.com/most-censorship-and-content-takedown-requests-come-from-us-says-google-...
5 0
3 years ago
Other questions:
  • Consider the following general code for allowing access to a resource:
    13·1 answer
  • Finding information on the web was made easier by _____________, which provide on-screen menus, making navigation of the web as
    12·1 answer
  • You just brought a new hard drive for your computer. U plan to use this as a secondary hard drive to store all your uma files. O
    10·1 answer
  • In the Microsoft publisher application, words underlined in red are ____.
    6·1 answer
  • Select the correct text in the passage,
    10·1 answer
  • How are static variables and methods created in Java? What happens if a non-static method of a class tries to access a static va
    10·1 answer
  • What is the most vulnerable information that should be protected to prevent unauthorized access to your online files and records
    8·1 answer
  • Choose the correct answer
    6·1 answer
  • Describe four traditional tehniques for collecting information during analysis.
    11·1 answer
  • 9. These particular machines can be decentralized.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!