1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maria [59]
3 years ago
14

Imagine a switch with three configured VLANs. How many IP subnets are required, assuming that all hosts in all VLANs want to use

TCP/IP?
a. 0
b. 1
c. 2
d. 3
e. You can't tell from the information provided.
Computers and Technology
1 answer:
tester [92]3 years ago
8 0

Answer:

You need 3 different IP subnets. -- d. 3

Explanation:

The devices in one VLAN are typically in the same IP subnet so you need one subnet for each VLAN.

You might be interested in
consider a system for temperature measurement consisting of an integrated temperature sensor (electronic component sensitive to
Paladinen [302]

Answer:

ZOO WEE MAMA

Explanation:

ZOO WEE MAMA

5 0
3 years ago
WRITE IN YOUR OWN WORDS:
MrRa [10]

Answer:

One major sign of a computer being hijacked is the use of system resource by unknown programs. For example, full memory, high cpu usage, slow start up, crashes and errors, and low avalible storage space.

Explanation:

5 0
3 years ago
Problem 2. (expectedcost) it is difficult to make a budget that spans several years, because prices are not stable. if your comp
Trava [24]
I dont know so sorry
7 0
3 years ago
Troubleshooting a printer that does not work includes a. connecting the printer to your computer b. checking to see if there is
Nady [450]

All of them are correct.

5 0
3 years ago
Carlos has become pretty efficient at using the Word Processor but he takes time to use the menu each time he saves, prints and
WARRIOR [948]

Answer:

He should make shortcuts like i do

Explanation:

7 0
3 years ago
Other questions:
  • The two types of one-time-password tokens are ______ and ______.
    10·2 answers
  • Alex leads a team of eight members. Arrange his tasks in sequential order of phases of group dynamics. What are the stages in gr
    13·1 answer
  • LITERALLY PLS ANYONE!!! 90 pointsss!
    7·2 answers
  • The autofilter sort method works on a(n)____ field(s).
    15·1 answer
  • Consider the following environment with a local dns caching resolver and a set of authoritative dns name servers
    9·1 answer
  • Design a 4-to-16 line Decoder by using the two 3*8 decoder-line decoders. The 3-to-8 line decoders have an enable input ( '1' =e
    13·1 answer
  • Describe all the steps a router goes through while deciding where to send the a packet. Explain why a router would choose one ro
    7·1 answer
  • 10. List three adaptations of wind-pollinated plants to promote pollination.<br>​
    12·1 answer
  • Define Technology. Explain the term.​
    13·2 answers
  • Which adaptation of eap utilizes eap-mschapv2 inside of an encrypted tls tunnel?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!