1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Harlamova29_29 [7]
4 years ago
10

You are working on a home office network. Recently, you added a cable modem to the network so Home-PC could connect to the inter

net. You added Home-PC2 to your network, but your networking configuration only allows Home-PC to connect to the internet. You need to add a hub to the network so that both computers can communicate with each other and connect to the internet. The computers do not need to have guaranteed bandwidth for their network connections.
Computers and Technology
1 answer:
irinina [24]4 years ago
6 0

Answer:

Complete this lab as follows:

Place the hub in the Workspace as follows:On the Shelf, expand Networking Device.Drag the 1000BaseTX Ethernet hub to the Workspace.

Connect the Home-PC computer to the hub as follows:Above the hub, select Back to switch to the back view of the hub.Above Home-PC, select Back to switch to the back view of the Home-PC computer.Select the Cat5e cable connected to the motherboard's NIC and drag the connector to an Ethernet port on the hub.On the Shelf, expand Cables.Select the Cat5e cable with RJ45 connectors.In the Selected Component window, drag a connector to the Ethernet port on the back of Home-PC.In the Selected Component window, drag a connector to an Ethernet port on the hub.

Provide power to the hub as follows:On the Shelf, select the power adapter to plug in the hub.In the Selected Component window, drag the DC power connector to the port on the hub.In the Selected Component window, drag the AC power adapter to an empty outlet on the wall or surge protector.

Confirm that Home-PC is properly connected to the network and internet as follows:On Home-PC, select Click to view Windows 10.In the notification area, right-click the Network icon and select Open Network and Sharing Center.The diagram should indicate an active connection to the home network and the internet.

Connect the Home-PC2 computer to the hub as follows:From the top menu, select Bench.Above Home-PC2, select Back to switch to the back view of the Home-PC2.From the Shelf, select the Cat5e cable with RJ45 connectors.In the Selected Component window, drag a connector to the Ethernet port on the back of Home-PC2.In the Selected Component window, drag a connector to an Ethernet port on the hub.

Confirm that Home-PC2 is properly connected to the network and internet as follows:On Home-PC2, select Click to view Windows 10.In the notification area, right-click the Network icon and select Open Network and Sharing Center.The diagram should indicate an active connection to the home network and the internet.

You can also switch the hub to the front view to use the link lights to verify connectivity to the hub.

Explanation:

You might be interested in
16. Select the correct answer.
Helga [31]

Answer: Plotter-- B

Explanation:

A Plotter is  sophisticated  printer that get commands from a computer and interprets them to draw high quality lines or vector  graphics on paper  rather than dots using one or several automated pens. This makes them useful in the area of  CAD , architecture drawings and engineering designs. The types of plotters we have include Drum Plotters, Flat Bed Plotters and Ink Jet Plotters.

8 0
3 years ago
Five corporations own over 90 percent of the media in the US.<br> 1.True<br> 2.False
avanturin [10]
<span>Five corporations own over 90 percent of the media in the US : </span>1.True.

7 0
4 years ago
What are the two basic literary forms?
Korolek [52]
Fiction and nonfiction
6 0
3 years ago
What is a man-in-the-middle attack​
VMariaS [17]

Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.

Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.

4 0
3 years ago
Read 2 more answers
What is the output of this line of code?
zzz [600]
The first one
“hello” + “goodbye”
6 0
3 years ago
Read 2 more answers
Other questions:
  • Jake and Sarah have an assignment of writing the history of American independence as a team. They divided their work in hait and
    7·2 answers
  • Elsa has collated information for a meeting using Excel. Due to certain developments, some of the data in her worksheet is now r
    6·1 answer
  • A knowledge and skills test is a tool support managers use when selecting new employees; it measures an applicant's understandin
    13·1 answer
  • Emily wants to search online for cakes containing nuts. However, she wants to skip cakes that have raisins in them. Which option
    9·1 answer
  • Which of the following is an electronic device, operating under the control of instructions stored in its own memory, that can a
    6·1 answer
  • Shawn works at the local electrical company in Nampa, ID, which provides electricity to the entire city of Boise. This area is p
    14·1 answer
  • PLEASE HURRY PLEASE HELP THIS CLASS ENDS TODAY AND I NEED HELP
    7·1 answer
  • Write a script that will calculate a person’s weight on each planet of the solar system, the sun, and the moon. You should creat
    11·1 answer
  • Which of the following was (and still is) used by computer programmers as a first test program?
    13·2 answers
  • 1110011*110011 binary multiplication
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!