1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erica [24]
3 years ago
6

During a network infrastructure upgrade, you have replaced two 10 Mbps hubs with switches and upgraded from Category 3 UTP cable

to Category 5e. During the process, you accidentally cut the Cat 5e patch cable that stretches from the network printer to the upgraded switch.
What is the impact on the network?

a) All network nodes authenticated by the same server as the printer will be unavailable.
b) All network nodes connected to the switch will be unavailable.
c) All network nodes, with the exception of the printer, will be available.
d) All network nodes on the same subnet as the printer will be unavailable.
e) All network nodes including the printer will be available.
Computers and Technology
1 answer:
julia-pushkina [17]3 years ago
6 0

Answer:

The answer is "Option c"

Explanation:

Its the infrastructure used to upgrade, for it's upgrading it begins with improving its internet services, that require new routers, adapters, and modulation schemes, that arrive with smart detectors and functionaries, if it accidentally  cut the cat 5e patch so, all the internet nodes shall be accessible except the server, and wrong choices can be described as follows:

  • In option a, It is wrong because all network is not authenticated by the same server.
  • In option b, Network nodes connection can be a switch, that's why is incorrect.  
  • Option d and Options e both were wrong because it is not divided on the same subnet and the printer is not available for all.
You might be interested in
you are researching the Holocaust for a school paper and have located several Web sites for information. In a paragraph of no le
jeka94
1. .com .org .edu those have a big part because .com is profit and .org is non profit. 
2. It shows who wrote it 
3. It shows a bio of who wrote it (So you know their actually qualified) 
4. And it has sources to back up for what they say.
7 0
4 years ago
If we develop a new policy for our environment that requires us to use complex and automatically generated passwords that are un
stepan [7]

Answer:

The answer is "Login complexity will be increased very exponentially".

Explanation:

In computer science, The password is also known as a series of characters, which allows you to use the validation process to validate any customer's privacy.  

  • It is normal usage of passwords that work together with a username to make it, it only accessible by the user, and to give the user accessibility to a computer, software or web page.
  • If the password is more complex so, it is hard to learn, and it also provides login complexity, that's why we must use a less complex password.
7 0
3 years ago
To copy and paste from an excel workbook to a word document, you must first
Firlakuza [10]
Select the cells to copy. Then push CNTL+C to copy them. Next, click the cells you want to paste in. Finally, push CTRL+v to paste
5 0
3 years ago
Consider the conditions and intentions behind the creation of the internet—that it was initially created as a tool for academics
svp [43]

It should be noted that the intention for the creation of the internet was simply for resources sharing.

The motivation behind the creation of the internet was for resources sharing. This was created as a tool for academics and federal problem-solvers.

It transpired as it wasn't for its original purpose anymore. Its users employed it for communication with each other. They sent files and softwares over the internet. This led to the security vulnerabilities that can be seen today.

Learn more about the internet on:

brainly.com/question/2780939

5 0
3 years ago
WILL GIVE BRAINLIEST AND HALLOWEEN CANDY!!!!!!!!!<br> who wants to talk?
Tamiku [17]
<h2>Sure, I wanna talk. (:      .........................</h2>
3 0
3 years ago
Other questions:
  • Consider a tcp connection between host b and server
    9·1 answer
  • Harry wants to change the background of all of his presentation slides. Which slide will enable him to make this change to all t
    14·1 answer
  • Will mark brainliest if correct. First come, first serve.
    10·1 answer
  • Explain what it means to have good file management skills.
    10·1 answer
  • अस्स्मन्चचरे ------------------- दृश्यते |
    8·1 answer
  • What is a quasi vpn?
    14·1 answer
  • What are the ways to search out a number from a tree?
    11·1 answer
  • Write a program that accepts a whole number as
    5·1 answer
  • How many people did you help today
    11·2 answers
  • I NEED HEP QUICK
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!