1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrezito [222]
3 years ago
10

An engineer created three VSANs on the Cisco MDS switch. VSAN 100 is allocated to the marketing department, VSAN 110 is allocate

d to the research department, and VSAN 120 is allocated to the business department. The engineer wants to verify that the interfaces for the research department are allocated accordingly. Which command should the engineer use?A. mdsswitch# show vsan 110
B. mdsswitch# show vsan membership
C. mdsswitch# show vsan
D. mdsswitch# show vsan usage
Computers and Technology
1 answer:
SCORPION-xisa [38]3 years ago
7 0

Answer:

Option B i.e., mdsswitch# show Vsan membership is the correct option.

Explanation:

The following commands is used by the engineer because it displays the membership of the VSAN( virtual storage area network).

switch# command is used to enter the configuration mode. So, the engineer using the following commands to verify that the interfaces for the research department.

You might be interested in
To reduce chances of system failure, engineers may use _____ .
Nataliya [291]
<span>To reduce chances of system failure, engineers may use process control. This is a system which involves activities that ensures the whole process variables can be predicted and controlled to prevent failure. This involves the use of safety valves and sensors.</span>
5 0
3 years ago
Read 2 more answers
According to Amdahl's Law, what is the speedup gain for an application that is 60% parallel and we run it on a machine with 4 pr
rodikova [14]

With four processing cores, we get a speedup of 1.82 times.

<h3>What is Amdahl's Law?</h3>

Amdahl's law exists as a formula that provides the theoretical speedup in latency of the implementation of a task at a fixed workload that can be expected of a system whose resources exist improved.

Amdahl's law exists that, in a program with parallel processing, a relatively few instructions that hold to be completed in sequence will have a limiting factor on program speedup such that adding more processors may not complete the program run faster.

Amdahl's law stands also known as Amdahl's argument. It is utilized to find the maximum expected progress to an overall system when only part of the system exists improved. It is often utilized in parallel computing to indicate the theoretical maximum speed up utilizing multiple processors.

Hence,  With four processing cores, we get a speedup of 1.82 times.

To learn more about Amdahl's Law refer to:

brainly.com/question/16857455

#SPJ4

6 0
2 years ago
⦁ Consider transferring an enormous file of L bytes from Host A to Host B. Assume an MSS of 536 bytes. ⦁ What is the maximum val
timurjin [86]

Answer:

a)  There are approximately  2^32 = 4,294,967,296 possible number of the sequence. This number of the sequence does not increase by one with every number of sequences but by byte number of data transferred. Therefore, the MSS size is insignificant. Thus, it can be inferred that the maximum L value is representable by 2^32 ≈ 4.19 Gbytes.

b)  ceil(2^32 / 536) = 8,012,999

The segment number is 66 bytes of header joined to every segment to get a cumulative sum of 528,857,934 bytes of header. Therefore, overall number of bytes sent will be 2^32 + 528,857,934 =  4.824 × 10^9 bytes.  Thus, we can conclude that the total time taken to send the file will be 249 seconds over a 155~Mbps link.

Explanation:

a)  There are approximately  2^32 = 4,294,967,296 possible number of the sequence. This number of the sequence does not increase by one with every number of sequences but by byte number of data transferred. Therefore, the MSS size is insignificant. Thus, it can be inferred that the maximum L value is representable by 2^32 ≈ 4.19 Gbytes.

b)  ceil(2^32 / 536) = 8,012,999

The segment number is 66 bytes of header joined to every segment to get a cumulative sum of 528,857,934 bytes of header. Therefore, overall number of bytes sent will be 2^32 + 528,857,934 =  4.824 × 10^9 bytes.  Thus, we can conclude that the total time taken to send the file will be 249 seconds over a 155~Mbps link.

8 0
3 years ago
A subject or object's ability to use, manipulate, modify, or affect another subject or object is known as ___________.
IRINA_888 [86]

Answer:

The correct answer to the following question will be "Access".

Explanation:

  • Registered users have legal access to a network, while hackers may access a system illegally. The capacity is controlled by access controls. Access is defined as the right of a subject or object to use, manipulate, modify, or influence another subject or object.
  • Access control was the selective limitation of access to a location or other property while the mechanism is represented by access management. Access act may mean use, entry, or use. Permission is called authorization to access a resource.

Therefore, Access is the right answer.

5 0
3 years ago
You are a computer Tech. You have been asked to solve a computer problem. The office manager says his computer not working corre
Nat2105 [25]

Answer:

1. Reboot computer .

2. If the issue persists, check if antivirus software is updated; if so, then verify if the problem is only with Office suite, try to save another Word, Excel, Power Point document and running other programs. If the problem is also extended to Excel or Power Point and other programs run properly then:

a. Uninstall Office Suite (documents and information won´t be lost)

b. Reinstall Office Suite  

c.      Run Word, Excel, etc.

Word documents should open properly.

Explanation:

The above procedure should solve the problem given that it was verified and discarded that the malfunction was caused by a virus and upon verifying that the problem was not only with Word, but all applications related to Office Suite, then by reinstalling the software any malfunction could be fixed.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Discuss Hashing and how it is utilized within the IT industry. Also, discuss how Hashing can improve our sorting and searching r
    12·1 answer
  • 1. Extract title Write a function extract_title that takes one parameter, the filename of a GenBank formatted file, and returns
    14·1 answer
  • When considering changing the content of a cell which button should you press to leave the cell as it originally was? 
    5·1 answer
  • How Oracle 12c advances the security discussion?
    12·1 answer
  • The purpose of maintaining a network of digital forensics specialists is to develop a list of colleagues who specialize in areas
    7·2 answers
  • Aside from human user types, there are non human user groups. Known as account types, __________ are implemented by the system t
    10·1 answer
  • Which of the following transfer rates is the FASTEST?
    15·1 answer
  • Which of the following statements tests if users walked 10,000 or more steps and ate fewer than 25 grams of sugar?
    9·1 answer
  • What is the Cycle of Dependency?
    14·1 answer
  • Write a function magicCheck that takes a one-dimensional array of size 16, a two-dimensional array of four rows and four columns
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!