1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lianna [129]
3 years ago
11

Cisco has created a proprietary layer 2 protocol used to manage VLAN configuration between switches called:________a. VLAN Confi

guration Protocolb. VLAN Tracking Protocolc. VLAN Creation Protocold. Auto VLAN Configuration Protocole. None of the above
Computers and Technology
1 answer:
Reil [10]3 years ago
7 0

Answer:

The correct answer is letter "E": None of the above.

Explanation:

The VLAN Trunking Protocol (<em>VTP</em>) provides an easy way of keeping an accurate VLAN configuration through a commuted network. The VTP allows solutions of commuted network easily scalable to other dimensions, reducing the need of manually setting up the red. The VTP composed of a layer 2 protocol used to manage VLAN setups between switches.

You might be interested in
What is the difference between a master device in a Bluetooth network and a base station in an 802.11 network?
spayn [35]

Answer:

In an 802.11, a master device in a bluetooth network organize themselves into a "Piconet" of up to 8 slave devices. In an 802.11, a base station is a receiver and transmitter that plays a role of the WIFI network.

Explanation:

802.11 is the original wireless specification and it was developed by IEEE. IEEE stands for Institute of Electrical and Electronic Engineers (IEEE).

In an 802.11, a master device in a bluetooth network organize themselves into a "Piconet" of up to 8 slave devices. In an 802.11, a base station is a receiver and transmitter that plays a role of the WIFI network.

7 0
3 years ago
Suppose you want to write a program that will read a list of numbers from a user, place them into an array and then compute thei
djyliett [7]

Answer:

The size of the array is dependent on the amount of memory the program can access.

Explanation:

Here according to the question the user is in need of memory space equal to the amount of numbers read from the list. So the size of the array should be equal to the total numbers read from the list. if the user reads 5 number from the list then the size of the array should be int a[5] if the numbers are integers. Wastage of memory space is not appreciated in a good piece of code.

6 0
3 years ago
Which of the following is not a property of a WAN:
docker41 [41]

Answer:

Option d is the correct answer for the above question.

Explanation:

  • WAN is a type of network that facilities network connection all over the world. It can connect every computer which is in anywhere in the world while the other technology like LAN and MAN is used for small area locations.
  • The above question asked that about that statement which is not the property of WAN and that is option d because it states that WAN is used to connect only small areas of computers, but it can connect all the computers of the world, while the other property is valid for WAN.
6 0
3 years ago
Why do you think viruses are called “viruses”? What do they have in common with the living viruses that cause diseases in humans
Vinvika [58]

Answer:

Computer viruses are referred to living viruses as they both have similar effects.

Explanation:

While living viruses invade cells and cause harmful effects on the body, computer viruses basically do the same thing. Computer viruses are a malicious code that inserts itself into a computer. It's designed to spread to one computer to another, just like a living virus.

Similarities:

  • Spreads from one host to another.
  • They both alter/harm the host.
  • Both can replicate itself.

Differences:

  • A computer virus is manmade, while living viruses aren't.
  • A computer virus needs to be removed manually through an app or software while living viruses are almost curable medicine.
  • A computer virus effects machines and software while living viruses only infect living organisms.
5 0
3 years ago
Read 2 more answers
It's not possible to die in an alcohol-related collision if you're not in an automobile.
frutty [35]

Answer:

B. False

Explanation:

  • Consumption of alcohol is not a good practice and is generally not allowed at the time of driving an automobile and is considered to be an offense as it may be injurious to health and property.
  • As too much alcohol can create possible chances of collusions and even if the person is not in an automobile can result in a collision if tries to cross the road. Like head injuries or leg injuries can occur.
8 0
3 years ago
Other questions:
  • Who can effectively use website authoring software?
    6·1 answer
  • Write a program that accepts a file name from the command line, then initializes an array with test data using that text file as
    6·1 answer
  • Rita wants to know the size of each image in a folder. Which view will help her find this information quickly?
    13·1 answer
  • The larger the Word Size of a computer
    6·1 answer
  • You need to implement a web application that is split in three parts, namely, Webpage, PHP and MySQL. Each of them will be used
    13·1 answer
  • Why is it important to put the most specific case first? What types of errors does it help avoid?
    11·1 answer
  • Please help me!!!
    8·2 answers
  • When an object is acted on by unbalanced forces, the object will always
    11·1 answer
  • Add the following numbers in abacus 2436+9214​
    8·1 answer
  • All character entities end with _____ to signal the browser that everything in between is an entity representing a symbol.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!