1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yawa3891 [41]
3 years ago
9

You are setting up a small network. The customer has decided to change his internet service provider (ISP) to EtherSpeed. The IS

P has installed a connection to both RJ45 jacks on the wall plate. You are responsible for selecting the correct router to connect the network to the internet. You want to use the fastest connection speed available while providing for security for both the Home-PC and Home-PC2 computers.
Your task is to complete the following:

⢠Use the appropriate network components to connect the two computers to the new ISP.
⢠Place the Ethernet router with firewall capabilities on the Workspace.
⢠Use the existing Cat5e Ethernet cables to connect the computers to the router's integrated Ethernet LAN ports.
⢠Use the AC to DC power adapter to plug in the device.
⢠Use the Network and Sharing Center on both computers to confirm that the computers are properly connected to the network and internet.
Computers and Technology
1 answer:
salantis [7]3 years ago
3 0

Home pc1 becouse it is the right one

You might be interested in
What conversion factor should be used to convert from meters to Gigameters?
Anit [1.1K]
I have the equation 1 meter = 1.0 * 10
-9
5 0
3 years ago
Which type of game controller has a set of controls for each hand?
svet-max [94.6K]
If you play the Wii, they have the controller and then they have a nunchuck that connects to the other controller, and you use that with your other hand. Hope that helps :)
6 0
3 years ago
In a networked environment, each computer on the network can access the hardware on the network. True of False?
kakasveta [241]
Access independ on your network it secure or not if not secure you can access to any hardware on the network
7 0
4 years ago
#include #include int main( ) { int value = 10; int pid; value += 5; pid = fork( ); if (pid > 0 ) { value += 20; } printf(val
ss7ja [257]

Explanation:

To understand how this program is working let us print the variable value at different stages of the program so that we can understand how it is working.

Intitally, value=10 when it was declared.

Then we added 5 and it become value=15

then we used fork() function which creates a parent(orignal) and child(duplicate)

When fork() succeeds it returns the child pid to parent and returns 0 to the child. As you can see (pid > 0) condition is always true therefore the parent pid value becomes 35 ( 15+20) and the child pid value becomes 0.

#include <stdio.h>

#include <unistd.h>

int main( ) {

   int value = 10;

     printf("%d\n",value);

   int pid;

   value += 5;

     printf("%d\n",value);

   pid = fork( );

     printf("%d\n",pid);

   if (pid > 0 )

   {

       value += 20;

   }

   printf("%d\n",value);

   return 0;

}

Output:

10 (initial value)

15 (modified value)

5343 (pid when fork is used)

35 (final modified value)

0 (child value)

15 (the parent value when fork was used)

8 0
4 years ago
In almost all cases, touching power lines or coming into contact with energized sources will result in what? Select the best opt
vichka [17]

Answer:

Severe injuries or death

Explanation:

4 0
3 years ago
Other questions:
  • Which of the following statements is true?
    14·1 answer
  • What list did poe appear on for the search engine lycos?
    11·1 answer
  • When a program lets the user know that an invalid menu choice has been made, this is an example of?
    14·1 answer
  • What are the differences between the various EHRs?
    9·1 answer
  • What is the name of the time delay in a CPU caused by differences between the speed o CPU, the system bus, and memory circuits?
    10·1 answer
  • (1)similarities between backspace key and delete key. (2) different between backspace key and delete key. (3) explain the term e
    10·1 answer
  • Computing is the provision of IT services on demand.
    9·1 answer
  • 2
    15·1 answer
  • Your friend Cameron’s little sister is visually impaired. Cameron is worried that his sister will not be able to use technology
    12·1 answer
  • Complex scientific research is usually done using?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!