1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
True [87]
3 years ago
9

You are helping a friend in college with his network connection. He would like a high speed connection between his computers so

he can play Super Blast with others. In this lab, your task is to complete the following: Choose an appropriate router that will provide security and the fastest local connection. Connect the router to both computers and to the dorm internet connection. Request new TCP/IP information from the router on both computers. Configure Windows Firewall on both computers. Turn on Windows Firewall for both the Private and the Public network profiles. Add an exception for the SuperBlast program only for the Private network profile.
Computers and Technology
1 answer:
inna [77]3 years ago
4 0

Solution :

Set up the router as follows:

On the Shelf, expand the Routers. And read the description for each of the devices. Drag the Ethernet $100/1000TX$ router with the firewall to the Workspace.

Connection of the router as follows:

Above the router, select the Back to switch to the back view of the router. Then select the cable currently connected to the wall plate and then drag it to a $LAN$ port on the router. Above the Dorm-$PC2$ computer, select $\text{back}$ to switch to the back view of the computer. On the Shelf, expand Cables. Select a Cat5e $RJ45$ cable. In the Selected Component window, drag the connector to the $LAN$ port on the computer. In the Selected Component window, drag the other connector to a $LAN$ port on the router. Select a Cat5e $RJ45$ cable. In the Selected Component window, drag a connector to the $WAN$ port on the router. In the Selected Component window, drag the other connector to the port on the wall plate.

Provide power to the router as follows:

On the Shelf, select the power adapter. In the Selected Component window, drag the DC power connector to the power port on the router. In the Selected Component window, drag the AC adapter connector to the surge protector. Above the router, select Front to switch to the front view to verify power and network activity lights.

Request new $TCP/IP$ information from the router for Dorm-PC as follows:

On the $\text{Dorm-PC}$ monitor, select Click to view $\text{Windows 10}$.In the Search field on the taskbar, enter command prompt. Under Best Match, select Command Prompt. Enter $\text{ipconfig}$ /renew and press $\text{Enter}$ to request new $TCP/IP$ information from the router. In the notification area, right-click the Network icon and select Open Network and Sharing Center. The network information map should indicate an active connection to the Firewall Network and the internet.

Configure Windows Firewall on $\text{Dorm-PC}$ as follows:

In Network and Sharing, select Windows Firewall. From the left menu, select Turn Windows Firewall on or off. Under Private network settings, select Turn on Windows Firewall. Under Public network settings, select Turn on Windows Firewall. Click OK.

You might be interested in
QUESTION
Lady_Fox [76]

Answer:

Explanation:

#include <iostream>

using namespace std;

int main ()

{

   int responses[30],count[6];

   int score = 0;

   string resp = " ";

   for (int i = 0; i < 30; i++)

   {

    responses[i] = 0;

   }

   for (int i = 0; i < 6; i++)

   {

    count[i,1]=0;

    count[i,2]=0;

    count[i,0]=0;

   }

   while ((resp != "Y") && (resp != "y"))

   {

    for (int i = 0; i < 30; i++)

    {

        while ((score > 5) || (score < 1))

           {

            cout << "Student " << (i+1)<< " please enter a value (1-5):";

            cin >> score;

        }

           responses[i] = score;

           if((score > 5)||(score<1))

           {

               if(score==1) count[1]++;        

               if(score==2) count[2]++;        

               if(score==3) count[3]++;        

               if(score==4) count[4]++;        

               if(score==5) count[5]++;        

           }

           score = 0;

    }

    cout<< "Response               Frequency              Percentage"<<endl;;

    cout<< "    1                      "<<count[1]<<"               "<<(count[1]/30)<<"%"<<endl;

    cout<< "    2                      "<<count[2]<<"               "<<(count[2]/30)<<"%"<<endl;

    cout<< "    3                      "<<count[3]<<"               "<<(count[3]/30)<<"%"<<endl;

    cout<< "    4                      "<<count[4]<<"               "<<(count[4]/30)<<"%"<<endl;

    cout<< "    5                      "<<count[5]<<"               "<<(count[5]/30)<<"%"<<endl;

    cout<< "Do you want to exit? Press Y to exit any other key to continue: ";

    cin>> resp;

   }

   return 0;

}

8 0
3 years ago
Before entering a loop, the first input, or ____, is retrieved.
Virty [35]

Loop is a control structure that causes a statement or group of statements to repeat.Before entering a loop, the first input, or the accumulator where the total will be kept is retrieved to an initial value, usually zero.

3 0
3 years ago
Advantages of monolithic operating system? ​
Lyrx [107]

Advntage:

provides CPU scheduling, memory management, file management, and other operating system functions through system calls. The other one is that it is a single large process running entirely in a single address space.

Disadvantage: if anyone service fails it leads to an entire system failure

8 0
2 years ago
Select the correct category of cybersecurity described.
Shalnov [3]

Answer:

Network security

Explanation:

Network security is a category of cybersecurity that is related to the protection of the infrastructure of the computer network from unauthorized access and intrusion that may be from intended attack or from an expedient  program which may result in the modification, malfunctioning, misuse or unacceptable disclosure of the network and the contents of the network

The category of cybersecurity that 'prevents intruders from accessing, misusing, destroying, adapting, or improperly disclosing networks, network infrastructure, or the information contained within networks' is network security.

6 0
2 years ago
What five safety habits are you using for the internet?
forsale [732]

Answer: Keep Personal Information Professional and Limited.

Keep Your Privacy Settings On.

Practice Safe Browsing.

Make Sure Your Internet Connection is Secure.

Be Careful What You Download.

Choose Strong Passwords.

Explanation:that’s what is think

4 0
3 years ago
Other questions:
  • e do loop differs from the while loop in that a. the while loop will always execute the body of the loop at least once b. the do
    9·1 answer
  • What are features of a product?
    8·2 answers
  • Suppose you want to use an Internet cafe to login to your personal account on a bank web site, but you suspect that the computer
    15·1 answer
  • Please help me with opinions, ideas, any websites that would help, or chart, article, video, or podcast to help support your pos
    10·1 answer
  • You are moving to an area where DSL will be available in the next six months. Which method of internet connectivity should you i
    13·1 answer
  • In a systems development life cycle (SDLC) model, the purpose of the _____ is to create a physical model that will satisfy all d
    10·1 answer
  • The use of desktop computer equipment and software to create high-quality documents such as newsletters, business cards, letterh
    14·1 answer
  • Assume there are two variables, k and m, each already associated with a positive integer value and further assume that k's value
    13·1 answer
  • Pro and Cons of Artificial Intelligence in Art <br><br> You must have 3 statements in each
    14·1 answer
  • What should a pie chart represent?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!