1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ololo11 [35]
3 years ago
8

A technician configures a switch with these commands:SwitchA(config)# interface vlan 1 SwitchA(config-if)# ip address 192.168.1.

1 255.255.255.0 SwitchA(config-if)# no shutdownWhat is the technician configuring?
Computers and Technology
1 answer:
yanalaym [24]3 years ago
5 0

Answer:

SVI (Switched Virtual Interface)

Explanation:

For a switch to have an IP address, a switch virtual interface must be configured. This allows the switch to be managed remotely over the network.

You might be interested in
Refer to the exhibit. If a hacker on the outside network sends an IP packet with source address 172.30.1.50, destination address
Luden [163]

Answer:

The packet is dropped

Explanation:

To see why we need to understand the ACL or Access-control list that is a list of permissions that specify which users can access or modify certain things in a system. Because the source IP  doesn't have any parameter and is just a plain IP and packet the Cisco firewall will drop the packet based on the ACL rules, in other words, the Cisco firewall doesn't have any parameter that allows it to verify the permission-level of the sender, therefore, the packet will drop.  

7 0
3 years ago
Which of the following values is an example of a floating point number?
Lunna [17]
A.19.67 is a floating point number
6 0
4 years ago
Mohammed's parents learn that his classmates have
n200080 [17]

FULL PROBLEM:

Mohammed’s parents learn that his classmates have begun sending him text messages making fun of his heritage. Mohammed says he’s fine because they are just teasing him.

Which challenge is making it difficult to stop the cyberbullying of Mohammed?

A.  The classmates are using secure computers.

B.  The classmates are using technology positively.

C.  Mohammed doesn’t have any evidence of the cyberbullying.

D.  Mohammed doesn’t believe the cyberbullying exists.

ANSWER:

D.  Mohammed doesn’t believe the cyberbullying exists.

3 0
3 years ago
Read 2 more answers
Dana is reviewing a coworker’s presentation and wants to make note of some questionable data on a chart. What steps should she t
Yuki888 [10]

Answer:

1. b.

2. c.

4. d.

Explanation:

8 0
3 years ago
Read 2 more answers
Business: check ISBN-13) ISBN-13 is a new standard for identifying books. It uses 13 digits d1d2d3d4d5d6d7d8d9d10d11d12d13.
alexandr1967 [171]

Answer:

Following are the code to this question:

#include <iostream>//defining header file

#include <string.h>//defining header file

using namespace std;//using package

char checksum(const char *x)//defining a method checksum  

{

int s=0,m,d;//defining integer variables

for (m= 1;*x;++x)//defining for loop for caLculate value

{

d=*x-'0';//use integer variable to remove last digit from input value  

s=s+m*d;//add value in s variable

m=4-m;//use m to remove 4 from m

}

return '0'+(1000-s)%10;//use return keyword to get value  

}

int main()//defining main method

{

char ISBNNum[14];// defining character array  

cout<<"Enter the first 12 digits of an ISBN-13 as a string:";//print message

cin>>ISBNNum;//input value from user end

if(strlen(ISBNNum)==12)//defining if block to check length

{

char a=checksum(ISBNNum);//defining char variable a to call method checksum

ISBNNum[12]=a;//use array to hold method value

ISBNNum[13]='\0';// use array to hold 13 character value

cout<<"The ISBN-13 number is "<<ISBNNum;//print number

}

else//defining else block

{

cout<<ISBNNum<<" is an invalid input"<<endl;//print message

}

return 0;

}

output:

please find the attachment.

Explanation:

In the given code a character method "checksum" is define that accepts a character as a parameter and inside the method, three integer variable "s,m, and d" is defined that uses the for loop to calculate the input value and use the return keyword for the return value.  Inside the main method, a char array "ISBNNum", is defined that input the value from the user-end and define the conditional statement.

  • In the if block, it uses "ISBNNum" char array that checks its length equal to 12, if this condition is true it defines char a to call the method and hold its value and use the array to sore value in a and its 13 lengths it stores "\0", and print its value.
  • If the condition is false, it will print input array value and print invalid input as a message.

8 0
4 years ago
Other questions:
  • The bit width of the LRU counter for a 32 KB 16-way set associative cache with 32 Byte line size is
    13·1 answer
  • Determine whether the relation represents a function. If it is a​ function, state the domain and range.
    6·1 answer
  • The Active Directory Users and Computers tool can be used to:______.
    11·1 answer
  • I have gtx880m Alienware 18.4” no video how do I repaste the chip
    7·1 answer
  • What advantages do fiber optic cables offer over twisted pair or other media choices?
    8·1 answer
  • You are managing an FTP server installed in Ubuntu Server. The server has created a very large log le, vsftpd.log. Which command
    14·1 answer
  • Pick one of the following scenarios and
    6·1 answer
  • Describe how serial data access finds data
    9·2 answers
  • Write a program that randomly (using the random number generator) picks gift card winners from a list of customers (every custom
    14·1 answer
  • Using an open connection to a small company's network, an attacker submitted arbitrary queries on port 389 to the domain control
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!