Answer:
Port security and violation mode.
Explanation:
A switch is a layer two device of the OSI model. It is used to transmit frames between nodes within a network. It transfers frames by discovering the destination Mac address and saving it to its address table, and sending the frame to the egest port to the destination.
The port security command is used to specify the Mac addresses that are recognised by a port. There are three types of port security, they are, dynamic, static and sticky Mac addresses that can configured on an interface.
The security violation command is used to decide what happens to a port when it detects an unfamiliar Mac address. The three security violation modes are protect, restrict and shutdown. It is used as an interface command alongside the port security command.
Answer:
Option b, Option c, and Option d are the correct options.
Explanation:
While Sherri is replacing the laptops processor because her's laptop working slow as compared to the past performance then, she decided to ensure to use the right processors for her laptop's motherboard. Then, she verifies that not under the warranty, and she also determines that the teardown procedure is available or not.
Evaluation-the making of a judgment about the amount, number, or value of something; assessment
Domain Name-Is a websites name (ex-Google)
Authoritativeness-The quality of possessing authority. The quality of trustworthiness and reliability.
Accuracy-the quality or state of being correct or precise
Timeliness-the fact or quality of being done or occurring at a favorable or useful time.
Objectivity-the quality of being objective.
Writing Style and Mechanics-Style has to do with how a piece of writing sounds. Everyone has a style which develops along with their writing.
Paragraph structure: Each paragraph should begin with a topic sentence that provides an overall understanding of the paragraph. ...
Sentence length: Sentences should be kept as short as possible so that their structure is simple and readable.
Graphics-are visual images or designs
Links- is an open source text and graphic web browser with a pull-down menu system.
<span>If a attachment is not reliable to open, terrible effects can happen, peradventure it may have a virus or even malware that can destroy a computers software.
To avoid this and stay on the safe side, try the following:-
- Open it in protected view
- Do not save the attachment on your computer
- Look at the author and read the message carefully to make sure it is not biased.
- Open it on a flash-drive </span>