1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Temka [501]
3 years ago
6

Your team has been asked to design a LAN for a very successful CPA firm with five departments in one building and a total of 560

employees. Currently, the firm has no networked computers, and it is open to any suggestions your team can offer. The firm does have a few requirements:
It wants to make sure that it can easily expand its LAN in the future without exorbitant costs and moving a lot of equipment.
Every department must have very fast access to the LAN.
The LAN must remain up at all times.
Must use Windows 7 operating system.
As a team, determine what kind of LAN your team will design for this company.

Deliverable Instructions:

Devise and prepare a 5-6 page proposal.
Use your group discussion board or group virtual classroom to discuss the approach your team will take.
As a team, create a 1 page executive summary to summarize your design, and 3 to 5 page paper with diagrams about the detailed network design.
Put them into one Word document.
Computers and Technology
1 answer:
ziro4ka [17]3 years ago
5 0

Answer:

Please find in attachment.

Explanation:

The details in attachment are self explanatory.

Download docx
You might be interested in
Consider the following method.
larisa86 [58]
Thank you please answer my other questions from today
6 0
3 years ago
What kind of security features does Microsoft Security Analyzer promise?
Margaret [11]

Answer:

  • Microsoft security analyzer easily update the software system and it a free standalone component which basically provide security to many systems. We can easily update pure system once in a week.
  • Basically, it is a free independent segment which provide the security to many other frameworks. It is used to protect various number of windows against weak passwords by using security scanning.
  • It also check errors in the operating system and provide the security to the file system.
  • It is used to determine the state of security and other specific guidance.

8 0
3 years ago
2a
zmey [24]

Answer:

See explaination

Explanation:

2a)

A hacker group hacked into the Bay Area Rapid Transit system, this was done to protest BART’s shut down of wireless communication in some BART stations. Such attacks is done mostly to stand for some situation which happened previously. Hence, we can say it is a form a hacktivism. It was not ethical as it disrupted the system for some time.But this is also a form of protest which is been done by some group of peoples.

2b)

If a foreign government launches a hacking attack, it can be considered a war.

If this type of attack happens then the repercussions may result to the war.

2c)

We gave an analogy between merchants accepting some amount of shoplifting, on the one hand, and merchants and credit card companies accepting some amount of credit card fraud, on the other hand.

THe streght so called can be pointed out as the money is rolling in the market and the business keeps on going.

The weakness can be described as the loss which is being incurred by the company.

7 0
3 years ago
Need help ASPA!!!!!!!!!
professor190 [17]
Answer is D the internet
7 0
3 years ago
Read 2 more answers
Describe what a layer 3 router is and what are its advantages and drawbacks compared to other network devices.
Oduvanchick [21]

Answer:

Did you mean layer 3 switch? Because a router always operates at layer 3

Explanation:

If the answer is yes, then a layer 3 is a switch that combines the functions of a switch and a router. So it is capable of operate layer 2 and layer 3. Some of its benefits are: Support routing between VLAN, decrease network latency because the packets don’t have to make extra hops to go through a router and reduce security management. But they are really expensive and lack of WAN functionality so they are used mostly for large intranet environments.

3 0
3 years ago
Other questions:
  • A(n) ________ address is a temporary ip address assigned from an available pool of ip addresses.
    12·1 answer
  • Suppose the information content of a packet is the bit pattern 1110 0110 1001 1101 and an even parity scheme is being used. What
    15·1 answer
  • Justin Blake and Raegan Beast anyone?? I miss Jaegan a ton and I need a fangirl to talk to.
    13·1 answer
  • Which method can help you prevent RSI while using a keyboard?
    14·1 answer
  • What’s the answer to this question?
    15·1 answer
  • Ebba received a message from one of her tech support employees. In violation of company policy, a user had downloaded a free pro
    14·1 answer
  • Count positive and negative number and compute the average. The program will have the user input an unspecified number of intege
    6·1 answer
  • Using hard disk to temporarily store data or instructions from ram is referred to as the
    12·1 answer
  • Translate We get up at 8 o'clock into Spanish in the box below:​
    9·1 answer
  • WILL GIVE MORE POINTS, PLEASE HELP!!!
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!