1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ser-zykov [4K]
3 years ago
11

You want high availability for DHCP services, a primary server to handle most DHCP requests, and a secondary server to respond t

o client requests only if the primary server fails to in about a second. The primary server has about 85% of the IP addresses to lease, leaving the secondary server with about 15%. You don't want the servers to replicate with each other.What should you configure?
Computers and Technology
1 answer:
babymother [125]3 years ago
5 0

Answer:

The blocking system.

Explanation:

In order to avoid servers to replicate with each other, I should configure the blocking system of the first DHCP.

For example, if the first DHCP fails to respond, the second will get in place, however, I have to configure the first system that immediately that the second DHCP starts working, the first blocks its information and use.

By this way, there won´t be any duplicated actions or reponses.

You might be interested in
Anyone got E-aqa login?​
pashok25 [27]

Answer:no

Explanation:

3 0
3 years ago
What is output?
postnew [5]

Answer:The French and Dutch settlements differed from the Spanish colonies in that they were created mainly to trade and develop industries, while the Spanish were primarily concerned with gold and silver excavation, and then later with sugar exportation.

Explanation:The French and Dutch settlements differed from the Spanish colonies in that they were created mainly to trade and develop industries, while the Spanish were primarily concerned with gold and silver excavation, and then later with sugar exportation.

8 0
3 years ago
_______ is a variation of phishing that uses voice communication technology to obtain the information the attacker is seeking.
Zanzabum
It's voice phishing but it's also sometimes referred to as vishing 
4 0
3 years ago
Universal containers regularly imports Accounts from an external order system that has its own ID field for each record.What sho
Vikki [24]

Answer:

B. Create a unique External ID field on Accounts in SFDC for matching.                                      

Explanation:

  • External ID is used to prevent duplicate records from being created as a consequence of the import operation, when importing custom objects or person accounts.
  • An external ID is a specific field that contains the External ID attribute.
  • External ID has unique record identifiers from a system that is outside the Salesforce.
  • When this option is selected Data Import Wizard identifies existing Salesforce records with external IDs that match the values in import file.
  • The External ID field enables to keep unique record IDs from an external system, usually for integration.
  • External ID field values should be unique and determine whether or not value are case sensitive can also be determined. For example XYZ and xyz will not be considered same if case sensitive option is not selected.

6 0
3 years ago
Write a function called st_dev. St_dev should have one #parameter, a filename. The file will contain one integer on #each line.
kodGreya [7K]

Answer:

  1. import statistics
  2. def st_dev(file_name):
  3.    with open(file_name) as file:
  4.        data = file.readlines()
  5.        numList = []
  6.        for x in data:
  7.            numList.append(int(x))
  8.        
  9.        return statistics.pstdev(numList)
  10. print(st_dev("text1.txt"))

Explanation:

The solution code is written using Python.

To ease the calculation task, we can import Python statistics module to use the pstdev method to calculate the population standard deviation of a list of numbers (Line 1).

Next, create a st_dev function that take single argument file_name (Line 3). In the function, it will open the input file and read the data line by line (Line 4-5). Create a for loop to traverse through each line of the data which is an integer and append it to numList (Line 7-8). We can pass the numList to pstdev method (Line 10) and return the resulting standard deviation value as output.

We test the function by passing a file which hold a list of integer values in each line (Line 12).

8

9

12

11

21

15

16

10

7

13

And the output we shall get is 4.019950248448356

6 0
4 years ago
Other questions:
  • Ben buys an Olympus E-PL2 from Sony which starts malfunctioning. When he opts for an exchange, the customer representative says
    11·1 answer
  • Impact of computer on education
    6·2 answers
  • After completion of this chapter, you should be able to:  Describe the structure of an IPv4 address.  Describe the purpose of
    5·1 answer
  • ​Lisa mentions that a program is developed to interact with other programs, and she wants to begin by testing the programs indiv
    12·1 answer
  • I just got my driver's permit!!! However, it says I have 2 restrictions. What are the restrictions? Is it the not being allowed
    13·1 answer
  • Give your definition of a view. Based on the Academic Database, identify and describe a scenario where it would be necessary to
    10·1 answer
  • Dr. Wayne is trying to developing techniques to cure Parkinson’s disease by inserting genetic material into patients’ cells to c
    12·1 answer
  • Choose the tag required for each stated goal.
    12·1 answer
  • Logan has developed an excellent presentation with interesting content. He received great feedback on the evaluation
    10·1 answer
  • Which of the following is NOT one of the four benefits of using email?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!