1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mars1129 [50]
3 years ago
12

When two or more links need to pass traffic as if they were one physical link, which of the following would be used to satisfy t

he requirement? A. Port mirroring B. 802.1w C. LACP D. VTP
Computers and Technology
1 answer:
leva [86]3 years ago
6 0

Answer: C)LACP

Explanation: LACP(Link Aggregation Control Protocol) is the protocol that is responsible for the management of the physical ports present on a particular channel. The main purpose of this protocol is to improve performance by laying the network in the parallel structure so that traffic can be managed.

Other option are incorrect because they don't provide traffic management over the physical link. Thus, the correct option is option(C).

You might be interested in
AYUDAAA ESPARA HOYYY
DIA [1.3K]

Answer:

what?

Explanation:

8 0
3 years ago
Read 2 more answers
Help me..and thank you​
kotykmax [81]

Answer:

#include <stdio.h>

void spaces(int n) {

 for(int i=0; i<n; i++) {

   putchar(' ');

 }

}

void numbersdown(int n) {

 for(int i=n; i>1; i--) {

   putchar('0'+i);

 }

}

void numbersup(int n) {

 for(int i=1; i<=n; i++) {

   putchar('0'+i);

 }

 putchar('\n');

}

int main(void) {

 int number;

 printf("Please enter a digit: ");

 scanf("%d", &number);

 for(int i=number; i>0; i--)

 {

   spaces(number-i);

   numbersdown(i);  

   numbersup(i);    

 }

}

Explanation:

I deliberately separated the solution into different functions for readability. If needed, the code could be made much more compact.

7 0
3 years ago
What is the range of possible values for the variable x?<br><br> int x = (int)(Math.random() * 10);
Nimfa-mama [501]

Answer:

int number = (int)(Math. random() * 10); By multiplying the value by 10, the range of possible values becomes 0.0 <= number < 10.0

please mark me as the brainliest answer and please follow me for more answers.

7 0
3 years ago
I want to write a C++ program to read the diameter of a circle. The program should find and display the area and circumference o
Andreas93 [3]

Answer:

#include <iostream>

const double PI = 3.14159;

int main() {

   double diameter;

   std::cout << "Please enter the diameter of the circle:" << std::endl;

   std::cin >> diameter;

   double radius = diameter / 2;

   double area = radius * radius * PI;

   double circumference = 2 * radius * PI; // or diameter * PI;

   std::cout << "Area: " << area << std::endl;

   std::cout << "Circumference: " << circumference << std::endl;

}

Explanation:

The first line imports the read/write library. The rest should be self-explanatory.

std::cin is the input stream - we use it to get the diameter

std::cout is the output stream - we write the answers (and commentary) there.

std::endl is the special "character" informing the output stream that we want it to put a newline character (and actually print to the output - it might have been holding off on it).

the // in the circumference computation signifies a comment - the program simply ignores this. I've added it to tell the reader that the circumference could have been computed using the diameter,

7 0
3 years ago
What is Server Message Block (SMB) used for in Windows and can a hacker still damage a network using SMB?
Aleksandr [31]

Answer:

The absolute most decimating ransomware and Trojan malware variations rely upon vulnerabilities in the Windows Server Message Block (SMB) to proliferate through an association's system. Windows SMB is a convention utilized by PCs for record and printer sharing, just as for access to remote administrations.  

A fix was discharged by Microsoft for SMB vulnerabilities in March 2017, yet numerous associations and home clients have still not applied it. So now, the unpatched frameworks permit dangers that exploit these vulnerabilities inside, helping dynamic malware crusades spread like Californian rapidly spreading fire.  

SMB vulnerabilities have been so effective for danger entertainers that they've been utilized in the absolute most unmistakable ransomware episodes and refined Trojan assaults of the most recent two years. Truth be told, our item telemetry has recorded 5,315 discoveries of Emotet and 6,222 of TrickBot in business systems—two Trojan variations that are utilizing the SMB vulnerabilities—over the most recent 30 days alone.

7 0
3 years ago
Read 2 more answers
Other questions:
  •                                                        HELP PLEASE 
    12·2 answers
  • Everyone’s favorite speedy blue hedgehog recently returned to his 2D origins in a critically acclaimed side-scrolling game. What
    8·2 answers
  • A/an ________is a device used to protect computers against surges and spikes in power.
    14·1 answer
  • For any two documents x and z, define k(x, z) to equal the number of unique words that occur in both x and z (i.e., the size of
    15·1 answer
  • In what way do coastal mountains affect a regions climate
    12·2 answers
  • Which of these is a valid use of the Reply All feature?
    11·1 answer
  • What is netiquettes?. Mention any 4 netiquettes. (for class 6)​
    5·1 answer
  • All who are interested in forex trading and bitcoin mining follow me for account management to all who are busy with work so i c
    14·1 answer
  • kayah has created a website that explains what her business does. what type of computer program is needed to access/view kayah's
    7·2 answers
  • In cell J6, insert a formula using the OR function that returns TRUE if the rating (cell 16) equals "A" or the email reminder (c
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!