1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marysya12 [62]
3 years ago
12

You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You def

ine VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate with a device on the second switch also in VLAN 1. What should you configure to allow communication between these two devices through the switches
Computers and Technology
1 answer:
vovikov84 [41]3 years ago
8 0

Answer:

Trunking.

Explanation:

In Computer Networking, to allow a device on the first switch in VLAN 1 to communicate efficiently with a device on the second switch also in VLAN 1, you should configure trunking protocol on the switch.

Trunking is a communication technique used to transmit packets simultaneously to users on a network by using multiple lines or frequencies.

You might be interested in
NEED ANSWER ASAP. CORRECT ANSWER GETS BRAINLIEST! TY
Tasya [4]

Answer:

scope because the scope will determine the Time for the employee to work

8 0
3 years ago
Three primary types of data that a forensic investigator must collect, in this order: 1.Volatile data 2.Temporary data 3.Persist
posledela

Answer:

1. volatile data

2. temporary data

3. persistent data

seems like you already got it correct

Explanation:

7 0
2 years ago
Drag the words into the correct boxes
tresset_1 [31]

Explanation:

if you have any doubts or queries regarding the answer please feel free to ask

4 0
2 years ago
John has had a message pop-up on his computer asking him to pay $800 to have his files
faltersainse [42]

• Installed a program containing ransomware/malware. (Do not accept downloaded without inferring it was installed)

• Opened an email attachment containing malware.

• Opened a file containing a malicious macro.

• Left his computer unsecure allowing someone else to install malware on it. (Should include an example, e.g. not logging off)

3 0
3 years ago
Read 2 more answers
Timothy was reading tournament results of the football World Cup matches on Infogoalistic.com. As he was going through the resul
Gennadij [26K]

Answer:

B) contextual

Explanation:

Contextual advertising is a form of targeted advertising for advertisements appearing on websites or other media.

For example:

Timothy was reading tournament results of the football World Cup matches on Infogoalistic.com. As he was going through the results, an advertisement of new football studs popped up. This is an example of <u>contextual</u> advertising.

5 0
3 years ago
Other questions:
  • Harry is creating a presentation for a school event. He has to deliver the presentation to a huge audience. What should he keep
    14·2 answers
  • Describe mobile computing
    7·1 answer
  • When employees are hired, they agree to only use cell phones during breaks. How would you classify this?
    13·2 answers
  • Search engines enable you to
    13·2 answers
  • The benefit of host and guest operating system difference is:
    8·2 answers
  • Raul in Colombia can enter data into a spreadsheet. Olivia in England can access the spreadsheet a few minutes later and use Rau
    7·1 answer
  • If you were infiltrating a network (10.16.0.0/16), and searching for vulnerabilities (while trying to remain undetected), why wo
    11·2 answers
  • In this lab you will learn about the concept of Normal Forms for refining your database design. You will then apply the normaliz
    15·1 answer
  • Brain for free 12628397
    14·2 answers
  • A file manager is used for all of the following except ____.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!