1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
topjm [15]
3 years ago
14

You manage a small LAN for a branch office. The branch office has three file servers and few client workstations. You want to us

e Ethernet device and offer guaranteed bandwidth to each server.How should you design the network?
Computers and Technology
1 answer:
lana66690 [7]3 years ago
8 0

You manage small LAN for a branch office. The branch office has three file servers and few client workstations. You want to use Ethernet device and offer guaranteed bandwidth to each server. You design the network by <u>connecting all network devices to a switch. Connect each server to its own switch port.</u>

<u></u>

Explanation:

  • A local-area network (LAN) is a computer network that spans a relatively small area.
  • Most often, a LAN is confined to a single room, building or group of buildings, however, one LAN can be connected to other LANs over any distance via telephone lines and radio waves.
  • The LAN is the networking infrastructure that provides access to network communication services and resources for end users and devices spread over a single floor or building.
  • Designing a LAN for the campus use case is not a one-design-fits-all proposition.
  • If there is a single 48-port switch, 47 devices can be supported, with only one port used to connect the switch to the rest of the network, and only one power outlet needed to accommodate the single switch

You might be interested in
Specifically, you will write two policies to ensure web server software and web browsers are secure. Your policy statements will
erik [133]

Answer:

Navigate to Prohibit Software from the Inventory tab. This will list the details of all the software that are already prohibited.

Click Add Prohibited Software. This will open the Add Prohibited Software dialog listing all the software detected in the managed computers. You should have scanned the Windows systems at least once to have the details of the software here.

Select the software that you wish to prohibit and move them to Prohibited List.

Note: In case you have grouped certain software and you are adding that Software

4 0
2 years ago
PUBG mobile id and name plz
ycow [4]
KSK Jemens je Jemen jeme this is mine
5 0
2 years ago
Your teacher needs to keep track of a biology experiment's results for all students, to help calculate the grades. Which applica
IRISSAK [1]

Answer:

I think notepad is best suited for this task...

3 0
3 years ago
Read 2 more answers
How does our behavior change when we know we're being watched?
Hoochie [10]

I can't even say this is an answer

If there isn't a specific answer for this, I think it depends on everyone. Maybe they'd behave better knowing that their actions are being monitored. Who in their right mind is going to act like a lunatic when they know people are watching.

I think it will most likely alter their attitude in a positive way but it will also most likely be fake actions put on show

5 0
2 years ago
This assignment is based on Exercise 8.4 from your textbook. Each of the following Python functions is supposed to check whether
Svetradugi [14.3K]

Explanation:

#1 is wrong because if the first character is not lowercase, it stops and returns false, ignoring all the other characters. It can be fixed by removing the else: statement and moving the return False statement outside of the loop.

This is efficient; if one lowercase character is encountered, the function 'knows enough' and can return true. Only if no lowercase is encountered it has to loop all the way to the end.

You can try this out on repl.it.

Many of the others functions have problems in them. #4 looks OK.

4 0
2 years ago
Other questions:
  • What is the key benefit of using RAM in a computer?
    12·1 answer
  • Phil wants to add a new video card, and he is sure the power supply is sufficient to run the new video card. But when he tries t
    12·1 answer
  • Face book requires you to change your password regularly<br> a. TRUE<br> b. FALSE
    14·1 answer
  • Danielle is looking for information on an accounting principle for class. She does not want to sift through a lot of information
    14·1 answer
  • Consider the following partial class definitions: public class A1 { public int x; private int y; protected int z; ... } public c
    12·1 answer
  • Mobile phones that function as credit cards are called _____.
    11·1 answer
  • - Explain the Windows User Authentication process for Client connecting to the domain
    11·1 answer
  • What element is not a selection in the Interface preferences? UI Character Presets UI Font Size UI Language UI Scaling
    9·1 answer
  • An integrated file is one that includes information created in _____ Office application(s).
    15·1 answer
  • Examples of applying successful visual design principles to bring a web page together are _________________. (Choose all that ap
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!