1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivahew [28]
3 years ago
5

You are the network administrator for a growing business. when you were initially hired, the organization was small and only a s

ingle switch and router were required to support your users. during this time, you monitored log messages from your router and switch directly from each device's console. however, the organization has grown considerable in recent months. you not must manage 8 individual switches and three routers. it's becoming more and more difficult to monitor these devices and stay on top of issues in a timely manner.
Computers and Technology
1 answer:
k0ka [10]3 years ago
6 0
Usually, network devices can be set up to send their syslog messages to a syslog server, so you'd just need a *nix computer with syslog setup to receive messages via the network, and you can read stuff there. You also get the advantage of having reglar expressions so that "noise" (messages you don't care about) isn't displayed.

Network devices can also be set up to use SNMP (Simple Network Management Protocol).

You might be interested in
Alice has to move around a lot to fetch objects at her workstation. Which ergonomic principle should Alice follow to prevent str
Assoli18 [71]
The answer is c arrange the objects at arms length
6 0
3 years ago
Read 2 more answers
TCP will guarantee that your packets will arrive at the destination, as long as the connection is still established. True False
puteri [66]

Answer: True

Explanation: TCP(Transmission control protocol) is the protocol that is responsible for making the connection between the two hosts and then  they can share the data between them.

TCP guarantees that the data or data packets that are being sent from the source will be delivered to the host  in the same way as it was sent from source port. This mechanism ensure that there will be no data manipulation in the order of the data. TCP also has a relation with the IP for the functioning.Thus the given statement is true.

3 0
3 years ago
Create the logic for a game that simulates rolling two dice by generating two random numbers between 1 and 6 inclusive. The play
guajiro [1.7K]

Answer:

The solution code is written in Python 3.

  1. import random  
  2. count = 0
  3. flag = False
  4. guess = int(input("Input your guess (2-12): "))
  5. while(count <=3):
  6.    dice1 = random.randint(1, 7)
  7.    dice2 = random.randint(1, 7)
  8.    if((dice1 + dice2) == guess):
  9.        flag = True
  10.    count += 1
  11.    
  12. if(flag):
  13.    print("User wins!")
  14. else:
  15.    print("Computer wins!")

Explanation:

A Random generator is needed for this question and therefore we start by importing Python random class (Line 1)

Next, create one counter variable,<em> count</em>, to ensure there will be only three rolling of the dices (Line 3).  We need another variable, <em>flag</em>, to track the status if the two dices equal to the <em>guess</em> number chosen by user (Line 4).

Next, prompt use to input a guess number (Line 5).

Within the while loop, we can use random class method <em>randint() to </em>generate random integer. The arguments 1 and 7 will give one random number ranged from 1 to 6 for <em>dice1</em> and<em> dice2</em>, respectively (Line 8 - 9).

If the total of<em> dice1 + dice2</em> equal to user <em>guess</em>, we turn the<em> flag </em>to <em>True</em>. If not, the <em>flag </em>will remain <em>False</em> after completing entire while loop.

If the <em>flag </em>turned to <em>True</em>, print the message "User Wins!" else print the message ("Computer wins!")

8 0
4 years ago
Pedestrians, cyclists, horse drawn vehicles and wheel chair users are known as ___________
Anton [14]
Hi, the answer you are seeking is A. Vulnerable Road Users.

Take care,
Diana
6 0
3 years ago
Read 2 more answers
Which of the following is the largest unit of information?
Mila [183]
What are the choices?

5 0
4 years ago
Read 2 more answers
Other questions:
  • What is something you can do to stay connected to the relationships in your life while we spend this time at home?
    13·1 answer
  • D-H public key exchange Please calculate the key for both Alice and Bob.
    12·1 answer
  • Which statement correctly describes how the density and temperature of air is related .
    7·1 answer
  • What is the main piece of computer software on which every other piece of software relies?
    15·1 answer
  • Which describes a design theme in PowerPoint? a set of elements that unify the slides and complement the topic a printed handout
    11·2 answers
  • Help me out with this .....
    10·1 answer
  • Explain in details three security countermeasures you know.​
    10·1 answer
  • In the forward chaining technique, used by the inference engine component of an expert system, the _____ condition is evaluated
    5·1 answer
  • What pets are on Terraria and how can you get them?
    15·2 answers
  • An Accenture healthcare client is interested in implementing an Artificial Intelligence (AI) solution to improve patient care, b
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!