1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
navik [9.2K]
4 years ago
4

The CNT Books network described in Case Project 8-1 is expanding. There are 200 more user stations in the building, and a total

of five floors are in use by the network. You have kept up with the design so far with a network of five subnets, each with its own router. The company leased a building across the street. You expect at least four subnets to be added to the design. The owner is concerned about how to connect to the building across the street, as he thinks the cost of contracting with a communications provider is too expensive for such a short distance. What solution can you suggest for connecting the building across the street with the existing building
Computers and Technology
1 answer:
ruslelena [56]4 years ago
7 0

Answer:

Check the explanation

Explanation:

For 1st part (which you said not needed):

Layers that are most likely concerned:

1- A computer will not connect to the net. After some investigation you will then discover that the patch cable is note ended properly.

2- A computer can access resources on the local LAN but not on a unlike subnet. You find that the computer’s default gateway is not configures properly.

3- You can ping a computer that you are trying to transport files to via FTP, but you can’t communicate via FTP.

4- All computers associated to a particular hub have lost network connectivity. You determine that the hub is the trouble.

5- You get an encrypted text file, but when you open it, you will then discover the text is unreadable. You decide that decryption did not take place as it should have.

For 2nd part of your question::

This is a some sort of answer and may not helpful always.............................

As we know dynamic addresses are popular with ISP, because it enables them to use fewer IP addresses than their total figure of customers.

They only need an address for each customer who is active at any one time. Globally routable IP addresses cost money, and some establishment that specialize in the obligation of addresses (such as RIPE, the European RIR) are very strict on IP address usage for ISP's(Internet service providers). Assigning addresses dynamically allows ISPs(Internet service providers) to save money, and they will often charge extra to provide a static IP address to their customers

You might be interested in
Jennifer is trying to install an anti-malware program on a computer that she believes might be infected. During the installation
Vlad [161]

Answer:

Install in Safe Mode

Explanation:

If a system is corrupted with malware, installing an antivirus or anti-malware might not be possible. The malware can hide in a system and it can prevent the anti malware software from installing or scanning on the system.

Running your system in safe mode and install is the best option. Safe mode blocks third party programs and hardware drivers. A malware should not start when a system is in safe mode, therefore you can install the anti-malware and scan to remove all the malware from your system.

5 0
3 years ago
An objective test or measurement that technology product evaluators use to compare two or more products is ____.
Crazy boy [7]
<span>An objective test or measurement that technology product evaluators use to compare two or more products is benchmark. The benchmark is set of standards which are used to compare two products. Several parameters are measured in order to compare the products and to define the weak points where improvements can be done. The obtained information form the test is used to improve performance. </span>
4 0
3 years ago
Atomic Term If an atom carries no charge, the positive charges from protons are balanced by the negative charges from the
Neko [114]

Answer:

yee ha

Explanation:

7 0
4 years ago
What is the name of the unique identifier assigned to any personal computer that is connected to the internet?
Stolb23 [73]
There is no truly unique identifier assigned to a PC. Any appearance of a unique ID is merely an illusion. The closest thing there is to a unique identifier is a MAC address, which is actually assigned to a network adapter (Ethernet port, wireless radio, etc.) and is usually unique but can be faked
7 0
3 years ago
Here are some instructions in English. Translate each of them into the Simple Machine language.
Evgen [1.6K]

Answer:

a. LOAD register 3 with the hex value 56

2356

b. ROTATE register 5 three bits to the right.

A503

c. JUMP to the instruction at location F3 if the contents of register 7 are equal to the contents of register 0

B7F3

d. AND the contents of register A with the contents of register 5 and leave the result in register 0

80A5

Explanation:

To translate the English instructions to Machine language we have to consider Appendix C of A Simple Machine Language sheet.

a. LOAD register 3 with the hex value 56

The OP code for LOAD is:

2

Operand is:

RXY

Description is:

LOAD the register R with the bit pattern XY.

In a.

3 represents R

56 represents XY

Now following this we can join OP and Operand together to translate a.

2356

b. ROTATE register 5 three bits to the right

The OP code for ROTATE is:

A

Operand is:

R0X

Description is:

ROTATE the bit pattern in register R one bit to the right X times. Each time place the  bit that started at the low-order end at the high-order end

In b.

5 represents R

three represents X

Now following this we can join OP and Operand together to translate b.

A503

c. JUMP to the instruction at location F3 if the contents of register 7 are equal to the contents of register 0.

The OP code for JUMP is:

B

Operand is:

RXY

Description is:

JUMP to the instruction located in the memory cell at address XY if the bit pattern in  register R is equal to the bit pattern in register number 0.

In c.

7 represents R register

F3 represents XY

Now following this we can join OP and Operand together to translate c.

B7F3

d. AND the contents of register A with the contents of register 5 and leave the result in register 0.

The OP code for AND is:

8

Operand is:

RST

Description is:

AND the bit patterns in registers S and T and place the result in register R

In d.

A represents register S

5 represents register T

0 represents register R

Now following this we can join OP and Operand together to translate d.

80A5

6 0
3 years ago
Other questions:
  • (Game Design) The ESRB was created by:
    8·1 answer
  • How has information technology made piracy possible?
    6·1 answer
  • Which internet site end in .com​
    10·2 answers
  • Why are file naming conventions essential
    13·2 answers
  • A small graphic that you click on to perform a function in a software program is called a _____.
    15·1 answer
  • Which method of traversing a tree would result in a sorted list for a binary search tree?
    11·1 answer
  • A ____ error occurs when an instruction does not follow the grammar of the programming language
    6·1 answer
  • NAT is able to stop ________. Group of answer choices a) scanning probes sniffers from learning anything about the internal IP a
    8·2 answers
  • To configure a router/modem, what type of IP interface configuration should you apply to the computer you are using to access th
    10·1 answer
  • Is designed to access a computer or operating system without the knowledge or permission of the user.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!