1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maria [59]
3 years ago
14

Imagine a switch with three configured VLANs. How many IP subnets are required, assuming that all hosts in all VLANs want to use

TCP/IP?
a. 0
b. 1
c. 2
d. 3
e. You can't tell from the information provided.
Computers and Technology
1 answer:
tester [92]3 years ago
8 0

Answer:

You need 3 different IP subnets. -- d. 3

Explanation:

The devices in one VLAN are typically in the same IP subnet so you need one subnet for each VLAN.

You might be interested in
Jim has just purchased two new SCSI hard disk drives and a controller card for them. He properly installs the hardware in his ma
yawa3891 [41]

Answer:

  • Create partitions on each hard disk drives.
  • Mount the partition created on each hard drive so they are accessible by the the operating system.
  • Format the partitions created with a filesystem recognized by Linux.

Explanation:

Having purchased the two new SCSI hard disk drives with the controller cards for each and installed them properly, before using them for data storage and retrieval he must first use the fdisk command to create one or more partitions on each of the hard disk drives then mount any partitions created on the two hard drives so that they are accessible by the operating system before then proceeding to format any partitions created with a valid filesystem recognized by Linux.

4 0
3 years ago
Brianna is feeling overwhelmed by the amount of digital
SIZIF [17.4K]

Information literacy defines the ability to indentify, gather and make good use of available information in to solve problems and increase productivity. Being able to decipher between factual and reliable information can be developed through critical consumption.

The size and amount of available information is so enormous, however, a sizeable amount of these information are not reliable and usually misleading.

Critical consumption allows individuals understand which of the information they require needs are true or untrue.

Hence, Brianna needs to develop her critical consumption skill in other to discern which of the information he needs.

Learn more :brainly.com/question/25284700

4 0
3 years ago
Which of the following statements goes back one step in the URL history?
andrew11 [14]

Answer:

history.back();

Explanation:

history. back() method is used to go back 1 step in URL history .You can also understand this like suppose you searched you tube on google then all the searches matching you tube will appear on the search page then you entered the you tube site. Then to go back on the search page you clicked on go back button in your browser which somewhere inside used history. back() to go to previous page.

8 0
4 years ago
The ________ tier of the three-tier architecture consists of computers, phones, and other mobile devices that have browsers that
andrey2020 [161]

Answer:

It is the user tier of the 3-tier architecture that consists of computers, phones, and other mobile devices that have browsers that request and process web pages.

Explanation:

Almost if not all applications that use e-commerce for operations use the 3-tier architecture.  3-tier architecture is simply the arrangement of server tier which consists of all computers that run a web server and a database tier that consists of computers that run a DBMS to store and retrieve data. We also have the user data that consists of computers, phones, and other mobile devices that have browsers that request and process web pages.

When you make a request, for instance to Google in your local browser, the browser sends a request to the internet. This initial interaction between the user and the internet is what is known as the user tier of the 3 tier architecture. Basically, it is the phase where end users access content online through graphical interface browsers and make requests to the web servers and DBMS.

Learn more about 3-tier architecture

brainly.com/question/12627823

#LearnWithBrainly

6 0
3 years ago
Discuss risks associated with people in cyber threat
BARSIC [14]

Answer:

1. Hacking of personal details.

2. Cyber harassment.

3. Hacking of business details.

Moreover it is a mental trauma for the victim too

Explanation:

6 0
3 years ago
Other questions:
  • Conventional prescription eyeglasses are considered sufficient PPE for eye protection. A) True B) False
    11·1 answer
  • What is the name of small programs stored on the hard drive that tell the computer how to communicate with a specific hardware d
    5·1 answer
  • Now, Kim wants to add the technical terms she typically misspells to the PowerPoint built-in list. Which option should she use t
    15·2 answers
  • Which type of market are you in if your firm, along with three other firms, controls 95% of the total music industry?
    13·1 answer
  • Gary lives in an area that receives a lot of rain throughout the year. which device would be useful to him to maintain his compu
    8·1 answer
  • Scenes for films are almost always filmed in the same sequence they appear in the script.
    14·1 answer
  • How much memory will be occupied by black and white image​
    8·2 answers
  • The term wiki refers to a(n): Group of answer choices type of short-message blogging, often made via mobile device and designed
    9·1 answer
  • 1.Which thematic group uses technology to direct the behavior of dynamical systems, ensuring that they behave in a predictable m
    14·1 answer
  • Briefly describe the function of options in a linux command and give an example of a useful option.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!