1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marysya12 [62]
3 years ago
12

You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You def

ine VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate with a device on the second switch also in VLAN 1. What should you configure to allow communication between these two devices through the switches
Computers and Technology
1 answer:
vovikov84 [41]3 years ago
8 0

Answer:

Trunking.

Explanation:

In Computer Networking, to allow a device on the first switch in VLAN 1 to communicate efficiently with a device on the second switch also in VLAN 1, you should configure trunking protocol on the switch.

Trunking is a communication technique used to transmit packets simultaneously to users on a network by using multiple lines or frequencies.

You might be interested in
1. Wash all work surfaces with a_______ wrung in hot soapy water.
grandymaker [24]

Answer:

sponge or wash cloth

Explanation:

3 0
3 years ago
Which of the following does not describe local alignment algorithm?
swat32

Answer:

The answer is "Option a".

Explanation:

A score can be detrimental. When an element has a score below zero, it means, that the sequences up to this point have no correlations, that are set to zero and its effects the previous alignment is excluded. Thus, alignment can be further found in every position later in the calculation. and other options are incorrect that can be described as follows:

  • In option b, In this option the score can be negative, that's why we can't set its value.
  • In option c, The first row and column must contain some value it can't be 0, that's why it is not correct.
  • In option d, It will start with a lower score and ends with a higher score, that's why it is not correct.

8 0
3 years ago
1. Consider the numbers 23.724 and 0.3344770219. Please normalize both. 2. Calculate their sum by hand. 3. Convert to binary ass
elena-s [515]

Answer:

please see explaination and attachment

Explanation:

Normalization is a database design technique that organizes tables in a manner that reduces redundancy and dependency of data. Normalization divides larger tables into smaller tables and links them using relationships.

see attachment for the step by step solution

7 0
3 years ago
What is an inode number? Group of answer choices A number that is associated with the file and unique in that particular filesyt
gregori [183]

An Inode number is a number that is related to the file and unique across all file systems in Linux and Unix.

A number that is associated with the file and unique in that particular filesytem.

<u>Explanation:</u>

Whenever any files are created on the system, It is given a file name with a number (inode)is unique. To access this file on the system, the user usually will use the file name. But here, he or she will have to access the file along with an Inode number associated with it.

Where stored as numbers datatype in a table called the Inode table. The Inode table is created only when the file system is created. It shows how many inodes are filled and how many are free. The command “df-i” shows the inode table in Linux

8 0
3 years ago
What are the main security weaknesses of coaxial cable, twisted pair cable, and fiber optic cable? How might the router itself b
Paraphin [41]

Answer:

Answered below

Explanation:

Coaxial cables weaknesses include; fluctuation of speed during heavy use, leaks at the point of connection and signal loss over long distances. Twisted pair cables are not durable enough and are susceptible to interference. Fibre optic cables are costly and need expertise to install.

Hacked or compromised routers can be infected with malwares that reroutes users to spam sites and also to ddos attacks.

Steps to protect cable networks include; network encryption, physical security, VPN usage, updating networks, auditing and mapping.

3 0
3 years ago
Other questions:
  • Match the terms related to the web with their explanations
    6·1 answer
  • The picture that graphically represents the items you use in Windows is called a/an
    5·1 answer
  • A palindrome is a word or phrase that reads the same both backward and forward. The word ""racecar"" is an example. Create an al
    15·1 answer
  • What is booting as used in computers?​
    13·2 answers
  • Write a program that reads a book (a file in text format), breaks each line into words, strips whitespace and punctuation from t
    10·1 answer
  • How to do row of circles in phyton programming ?
    11·1 answer
  • The part of the screen where you see the results of your code is called the Editor.
    15·2 answers
  • Write a function called add_tuples that takes three tuples, each with two values, and returns a single tuple with two values con
    7·1 answer
  • How to test nativeelement in angular.
    8·1 answer
  • Outline the steps for logging into E-mail account​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!