1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mart [117]
3 years ago
9

In this lab, your task is to complete the following: Enable all of the necessary ports on each networking device that will allow

the computers and the devices to communicate. Make sure you don't create a switching loop. Make sure that any ports that could create a switching loop are disabled.
Computers and Technology
1 answer:
Sphinxa [80]3 years ago
5 0

Answer:

enable the used ports in the router with their respective IP address and only the connected ports in the switch. Allow configure the STP on the switch

Explanation:

Network switches are used to connect a group of computer devices in a network LAN. It is automatically enabled when a port is connected and creates a MAC address table of the computers connected to it. STP or spanning-tree protocol is a protocol used to prevent looping in a switch. Unused ports can be disabled for security reasons.

A router is a network device that is used to forward packets between networks. All used ports in a router must be enabled and configured with an IP address and subnet mask.

You might be interested in
A vast global network that is made up of many smaller interconnected networks is known as:
Galina-37 [17]

The answer is The Internet.   It is a vast global network that is made up of many smaller interconnected networks. It connects to millions of computer units world wide, in which any computer can communicate with any other computer as long as they are both connected to the Internet. It also made access to information and communication easier.

6 0
4 years ago
Read 2 more answers
2.5 Code: Practice Question 1
trapecia [35]

Answer:byways the question?

Explanation:

8 0
3 years ago
Read 2 more answers
Which of the applications below is designed to help a user bypass enforced web filtering policies?
Tanya [424]
New versions of opera comes with built in VPN
7 0
3 years ago
What is the first computer company​
katovenus [111]

Answer:

Electronic controls company founded in 1949

3 0
3 years ago
Read 2 more answers
Select the correct text in the passage. Idenufy the phrase that shows the use of a non-contact-type temperature sensor. Jim work
suter [353]

Answer:

where he is allowed only to enter on successful biometric verification by sensor at the gate,,it shows to some extent there is no contact,,,the molten we are told is risky so there should be no close contact with it,,

5 0
3 years ago
Other questions:
  • Spencer is a recent graduate who finds a dream car that costs $45,000. Even better, there's a 0% APR for 36 months offer from th
    13·1 answer
  • Our company is only interested in purchasing a software upgrade if it leads to faster connectivity and data sharing. The old sof
    7·1 answer
  • Ann wants to create a bookmark. She should
    9·2 answers
  • Select the correct answer.
    8·1 answer
  • Determine the exact output of the code $str = "The quick brown fox jumps over the the lazy dog"; echo strpos($str, 'fox');
    6·1 answer
  • Discuss how does a Modulus Operator function
    7·1 answer
  • Through the use of computational thinking techniques, models and algorithms can be created. A(n) ___1___ can be created that rep
    12·2 answers
  • Why is it important to install updates? Why should you use the Power button on the Start menu instead of the Power button on you
    7·1 answer
  • Business Rules constraints falls into two categories:
    7·1 answer
  • One benefit for a small business using the hosted software model for its enterprise software is that it can succeed without ____
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!