1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erica [24]
3 years ago
6

During a network infrastructure upgrade, you have replaced two 10 Mbps hubs with switches and upgraded from Category 3 UTP cable

to Category 5e. During the process, you accidentally cut the Cat 5e patch cable that stretches from the network printer to the upgraded switch.
What is the impact on the network?

a) All network nodes authenticated by the same server as the printer will be unavailable.
b) All network nodes connected to the switch will be unavailable.
c) All network nodes, with the exception of the printer, will be available.
d) All network nodes on the same subnet as the printer will be unavailable.
e) All network nodes including the printer will be available.
Computers and Technology
1 answer:
julia-pushkina [17]3 years ago
6 0

Answer:

The answer is "Option c"

Explanation:

Its the infrastructure used to upgrade, for it's upgrading it begins with improving its internet services, that require new routers, adapters, and modulation schemes, that arrive with smart detectors and functionaries, if it accidentally  cut the cat 5e patch so, all the internet nodes shall be accessible except the server, and wrong choices can be described as follows:

  • In option a, It is wrong because all network is not authenticated by the same server.
  • In option b, Network nodes connection can be a switch, that's why is incorrect.  
  • Option d and Options e both were wrong because it is not divided on the same subnet and the printer is not available for all.
You might be interested in
As a prospective student, what is the best reason to request an interview with your college application?
weqwewe [10]

Answer: The correct answer is A. I just answered this question myself!

6 0
3 years ago
What dose AUP stand for??????????
kipiarov [429]

Answer:

Acceptable Use Policy

Explanation:

A: Acceptable

U:Use

P:Policy

3 0
3 years ago
Read 2 more answers
A manufacturing company has several one-off legacy information systems that cannot be migrated to a newer OS due to software com
Digiron [165]

The resiliency technique which would provide the aforementioned capabilities is: D. Full backups.

An operating system (OS) can be defined as a system software which is pre-installed on a computing device, so as to manage or control software application, computer hardware and user processes.

In this scenario, a manufacturing company cannot migrate its several one-off legacy information systems (IS) to a newer operating system (OS), due to software compatibility issues.

Resiliency can be defined as a measure of the ability of a network, server, storage system, computing system or data center, to recover quickly and continue operating when it experience adverse conditions such as:

  • Power failure.
  • Equipment failure.
  • Data loss.

In Computers and Technology, there are four (4) main resiliency technique and these include:

I. Redundancy.

II. RAID 1+5.

III. Virtual machines.

IV. Full backups.

Full backup is a resiliency technique which create backups of the systems for recovery and it allows operating system (OS) patches to be installed on computer systems.

Read more: brainly.com/question/17586013

3 0
3 years ago
What term describes the amount you must pay in order to be considered “up-to-date” with your credit card payments?
yuradex [85]

Answer:

Minimum payment.

Explanation:

A loan can be defined as an amount of money that is being borrowed from a lender and it is expected to be paid back at an agreed date with interest.

Generally, the financial institution such as a bank lending out the sum of money usually requires that borrower provides a collateral which would be taken over in the event that the borrower defaults (fails) in the repayment of the loan.

A credit score can be defined as a numerical expression between 300 - 850 that represents an individual's financial history and credit worthiness. Therefore, a credit score determines the ability of a borrower to obtain a loan from a lender.

This ultimately implies that, the higher your credit score, the higher and better it is to obtain a loan from a potential lender. A credit score ranging from 670 to 739 is considered to be a good credit score while a credit score of 740 to 799 is better and a credit score of 800 to 850 is considered to be excellent.

Additionally, credit card can be defined as a small rectangular-shaped plastic card issued by a financial institution to its customers, which typically allows them to purchase goods and services on credit based on the agreement that the amount would be paid later with an agreed upon interest rate.

Minimum payment is a term which describes the amount you must pay in order to be considered “up-to-date” with your credit card payments. A credit card holder that meets the minimum payment and has a good credit score is eligible for more credits and loans.

4 0
3 years ago
There are two String variables, s1 and s2, that have already been declared and initialized. Write some code that exchanges their
Ivan

Answer:

//here is code in java.

import java.util.*;

class Solution

{

// main method of class

public static void main (String[] args) throws java.lang.Exception

{

   try{

    // declare an initialize first string variables

     String st1="hello";

     // declare an initialize first string variables

     String st2="world";

     // create another string variable

    String st3;

    // exchange the value of both string variables

    st3=st1;

    st1=st2;

    st2=st3;

    System.out.println("value of first String after exchange: "+st1);

    System.out.println("value of second String after exchange: "+st2);

   }catch(Exception ex){

       return;}

}

}

Explanation:

declare and initialize two string variables.Create another string variable "st3". first assign value of "st1" to "st3" after then value of "st2" to "st1" and then  assign value of "st3" to "st2". This will exchange the values of both the string.

Output:

value of first String after exchange: world

value of second String after exchange: hello

8 0
3 years ago
Read 2 more answers
Other questions:
  • Write an exception class named InvalidTestScore. Modify the TestScores class you wrote in Part I so that it throws an InvalidTes
    10·1 answer
  • In your presentation you added a text box to?
    5·1 answer
  • Which of the following is not a job title associated with a career in visual and audio technology? master control operator produ
    9·1 answer
  • Which of the following is not a method of data management?
    15·1 answer
  • How many bits would be needed to count all of the students in class today there is 20 students
    6·1 answer
  • Dynamic alliance networks work best in industries: a. that are mature and stable in nature. b. where the coordination of product
    9·1 answer
  • A _______________ is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a t
    10·1 answer
  • Can you please answer the question in the picture ! :)
    6·1 answer
  • What does a hanging indent look like?
    7·1 answer
  • Which statement is true about the energy of electromagnetic radiation?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!