1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tresset_1 [31]
3 years ago
5

You manage a network that uses switches. In the lobby of your building, there are three RJ45 ports connected to a switch. You wa

nt to make sure that visitors cannot plug their computers into the free network jacks and connect to the network. But employees who plug into those same jacks should be able to connect to the network. What feature should you configure
Computers and Technology
1 answer:
erma4kov [3.2K]3 years ago
8 0

Answer:

Port authentication

Explanation:

A port authentication enables the configuration of a parameters of the ports to connect to the network. When the ports are in the Force Authorized state, only some configuration changes are possible.

In the context, I want to configure the port authentication so as to make sure that the people who visited the building and wants to plug in the switch should connect to the network and not the free networks. An d also the employees who plug in the same jack should also connect to the same network.

You might be interested in
To view paragraph marks, click on the ______ tab, in the paragraph group, click show/hide
sergejj [24]

Answer:

Home

Explanation:

Thank Quizlet, lol!

3 0
3 years ago
Steps for turning off two step verification on ,for example, iPhones.
Tems11 [23]

Answer:

Step 1: Visit iCloud.com and log in with your Apple ID and password

At the same time, a window also pops up on iDevice

you need to click "Allow"

Copy the code from your phone to icloud.com

Step 2: Once signed in, select Settings on homepage

Step 3: Click "Manage" Apple ID.

Step 4: You will be directed to another site – appleid.apple.com

input your password to log in and verify it with Apple ID verification code.

Step 5: Then you will enter the manage page.

Click "Edit" in Security column.

Step 6: Click "Turn Off Two-Factor Authentication"

then confirm it.

Step 7: Then you need to select your security questions and answer them

click "Continue" after confirming your birthday and rescue email.

After all of these steps, you have turned off two factor authentication for Apple ID successfully.

Source : https://www.imobie.com/guide/anytrans/how-to-turn-off-two-step-verification-in-icloud.htm

8 0
3 years ago
PLEASE HELP ASAP!!!
Studentka2010 [4]

If you are using CSS :

table {

   border-collapse: collapse;

   border: 5px solid black;

   width: 100%;

}

td {

   width: 50%;

   height: 2em;

   border: 1px solid #ccc;

}

HTML

<table>

   <tbody>

       <tr><td></td><td></td></tr>

       <tr><td></td><td></td></tr>

       <tr><td></td><td></td></tr>

   </tbody>

</table>

for HTML:

<!DOCTYPE html>

<html>

<head>

<meta charset="UTF-8">

<title>Sample table</title>

<style>

table {

   border-collapse: collapse;

   border: 5px solid black;

   width: 100%;

}

td {

   width: 50%;

   height: 2em;

   border: 1px solid #ccc;

}

</style>

</head>

<body>

<table>

   <tbody>

       <tr><td></td><td></td></tr>

       <tr><td></td><td></td></tr>

       <tr><td></td><td></td></tr>

   </tbody>

</table>

</body>

</html>

3 0
3 years ago
When you hear music, read a printout, or view a video, you are using a computer's
Alik [6]

Answer:

Output device.

Explanation:

An output device can be defined as a hardware device that typically receives processed data from the central processing unit (CPU) and converts these data into information that can be used by the end user of a computer system.

All of the output device of a computer are known as peripheral devices and they provide data (informations) to the end users in various formats such as video, audio, texts, images etc.

Since output devices are peripheral devices, they can be connected to the computer system wirelessly or through a wired-connection (cable).

Some examples of output devices are monitor, speakers, printer, projector etc.

Hence, when you hear music, read a printout, or view a video, you are using a computer's output device.

5 0
3 years ago
Q-3 A technician is setting up a computer lab. Computers on the same subnet need to communicate with each
Tasya [4]

Answer:

the answer would be B proxy server

4 0
4 years ago
Other questions:
  • The more resources you have to choose from during an open book test, the better you will do on the test because more
    13·1 answer
  • How do you convert a decimal to binary?
    9·2 answers
  • Assume the following instruction mix for some program:______.
    8·1 answer
  • One of the most common uses of spreadsheet are
    12·1 answer
  • What are some characteristics of pseudocode? Check all that apply. Pseudocode is an informal way of expressing ideas and algorit
    11·2 answers
  • (1)similarities between backspace key and delete key. (2) different between backspace key and delete key. (3) explain the term e
    10·1 answer
  • I need help with Exercise 3.6.7: Sporting Goods Shop in CodeHS. ASAP
    5·1 answer
  • How do you resolve conflicts in your life??
    11·1 answer
  • Drag the tiles to the correct boxes to complete the pairs.
    13·1 answer
  • What is connectivity?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!