Answer:
The configuration of the R1 is as follows
Explanation:
Router>enable
Router#show running-config
Router#show startup-config
Router#configure terminal
Router(config)#hostname R1
R1(config)#line console 0
R1(config-line)#password letmein
R1(config-line)#login
R1(config-line)#exit
R1(config)#enable password cisco
R1(config)#enable secret itsasecret
R1(config)#service password-encryption
R1(config)#banner motd #Unauthorized access is strictly prohibited#
R1(config)#end
R1#exit
R1>enable
R1#copy running-config startup-config
R1#show flash
R1#copy startup-config flash
Answer:
D
Explanation:
As it's not fair if they all lose there privileges
Answer:
- import java.util.Arrays;
- import java.util.Scanner;
-
- public class Main {
- public static void main(String[] args) {
- Scanner input = new Scanner(System.in);
- double distances [] = new double[7];
-
- for(int i=0; i < distances.length; i++){
- System.out.print("Input running distance for day " + (i+1) + ": ");
- distances[i] = input.nextDouble();
- }
-
- System.out.println(Arrays.toString(distances));
- }
- }
Explanation:
The solution code is written in Java.
Firstly, create a Scanner object to get user input for running distance (Line 6). Next, declare a distances array and set the array size to 7 because we intend to use this array to hold running distance for 7 days per week.
Next, use the for loop that run for 7 times to repeatedly prompt user to input running distance for each day and store each value to the array distances (Line 9 -12).
At last, display the array to console terminal (Line 14).
The access control list searches for patterns in the communication between different packets and responds to any assaults that are found.
<h3>What is the access control list?</h3>
An access control list searches for patterns in the communication between different packets and responds to any assaults that are found.
Based on the IP header data, such as the source or destination IP address, protocol, or socket number, an access control list filters traffic.
Thus, the access control list searches for patterns in the communication between different packets and responds to any assaults that are found.
Learn more about the access control list here:
brainly.com/question/13718195
#SPJ4
Answer:
sorry please write in English than i help.you i don't understand your language