1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mart [117]
3 years ago
9

In this lab, your task is to complete the following: Enable all of the necessary ports on each networking device that will allow

the computers and the devices to communicate. Make sure you don't create a switching loop. Make sure that any ports that could create a switching loop are disabled.
Computers and Technology
1 answer:
Sphinxa [80]3 years ago
5 0

Answer:

enable the used ports in the router with their respective IP address and only the connected ports in the switch. Allow configure the STP on the switch

Explanation:

Network switches are used to connect a group of computer devices in a network LAN. It is automatically enabled when a port is connected and creates a MAC address table of the computers connected to it. STP or spanning-tree protocol is a protocol used to prevent looping in a switch. Unused ports can be disabled for security reasons.

A router is a network device that is used to forward packets between networks. All used ports in a router must be enabled and configured with an IP address and subnet mask.

You might be interested in
Write an expression that executes the loop body as long as the user enters a non-negative number.
Grace [21]

Answer:

user_num = 9

while user_num > -1:

 print("Body")

 user_num = int(input())

print("Done")

If this answer helped consider rating and marking brainliest :)

7 0
2 years ago
Read 2 more answers
The union of two bags is a new bag containing the combined contents of the original two bags. Design and specify a method union
irga5000 [103]

Omg does your fingers hurt?????! Are u okay?? Cause u typed a lot you could have just pictured it. Poor thing

3 0
3 years ago
A local firewall adds protection to a hardware firewall by protecting a device _______. Select all that apply. WILL GIVE BRAINLI
Dmitry_Shevchenko [17]
Answer is c. have a good day
6 0
3 years ago
Read 2 more answers
A slide in Olivia's presentation has the Title and Content layout applied. The bulleted list on the slide contains 14 items and
Harrizon [31]

Answer:

1) Right-click the slide, select Layout, and select Two Content

2) <em>*While on the same slide* </em>-go to the Ribbon, select Layout and select Two Content.

Explanation:

Either of these options will change the layout of the slide. After this is done, select 8-14 and cut and paste them in the second text box. Then format them to look aesthetically pleasing.

8 0
4 years ago
Which applications run on IHGs private cloud?
Svetlanka [38]

Answer:

Applications CSS and JvaP

Explanation:

6 0
4 years ago
Other questions:
  • How to become a software tester?
    11·1 answer
  • An administrator needs to make sure that video conferencing is allocated a high portion of bandwidth within a company network. W
    11·1 answer
  • Data from RAM may be placed where to free up space?
    7·1 answer
  • What is the grooming process as it relates to online predators?
    12·2 answers
  • What does this mean in python?
    5·1 answer
  • Which of the following is time-dependant? Group of answer choices
    8·1 answer
  • Which user characteristic may not be used to change keyword bids in adwords?:?
    11·1 answer
  • Which is the correct option?
    6·1 answer
  • The following statements regarding centralized administration concepts are presented to you in an interview in which only one of
    5·1 answer
  • A group of small local businesses have joined together to share access to a cloud-based payment system. Which type of cloud is m
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!