Answer:
Port security and violation mode.
Explanation:
A switch is a layer two device of the OSI model. It is used to transmit frames between nodes within a network. It transfers frames by discovering the destination Mac address and saving it to its address table, and sending the frame to the egest port to the destination.
The port security command is used to specify the Mac addresses that are recognised by a port. There are three types of port security, they are, dynamic, static and sticky Mac addresses that can configured on an interface.
The security violation command is used to decide what happens to a port when it detects an unfamiliar Mac address. The three security violation modes are protect, restrict and shutdown. It is used as an interface command alongside the port security command.
Answer:
Name of Operating System: Ubuntu
Five legal file names:
inventory.txt
total.txt
NIKKAH.txt
Defaulter.txt
studenT.txt
Five illegal file names:
wel/come.txt
..
MY>note.txt
.
my<work.yxt
Explanation:
To fix the illegal name:
1. Remove the special character, so it becomes welcome.txt
2. Remove the double dot and rename using text characters
3. Remove the special character, so it becomes MYnote.txt
4. A file cannot be named using dot. So we rename to a textual name
5. Remove the special character, so it becomes mywork.txt
Some additional rule for naming of files legally in Unix is that, you cannot use a reserved word to name your file. Starting a file name with number is allowed. Starting a file name with dot make the file to be hidden.
<span>A large organization minimum at-least 2 DNS servers are needed. DNS servers are each internet domain in need. and Multiple server farms distribute the DNS Server. One of the DNS Server is must in separate location. install DNS server on all domain controller. DNS server on every domain controller is must.</span>
Answer:
Following are the program in c language
#include<stdio.h> // header file
int main() // main function
{
int ar[10],k,biggest; // variable declaration
printf("Enter the ten values:\n");
for (k = 0;k < 10; k++)
{
scanf("%d", &ar[k]); // user input of 10 number
}
biggest = ar[0]; // store the array index of 0 into biggest variable
for (k = 0; k< 10; k++) // finding the biggest number
{
if (ar[k] >biggest)
{
biggest = ar[k];
}
}
printf(" biggest num is %d", biggest); // display the biggest number
return 0;
}
Output:
Enter the ten values:
12
2
4
5
123
45
67
453
89
789
biggest num is 789
Explanation:
Here we declared an array ar[10] of type int which store the 10 integer values.
Taking 10 integer input from the user in array ar .After that iterating the loop and finding the biggest number by using if statement and store the biggest number in biggest variable .
Finally display biggest number.
Answer:
Apple users tend to like the company and love its products. Apple has successfully nurtured this Affective component of its customers' attitudes.
Explanation:
There are three component of attitudes, they include the behavioral component, the affective component and the cognitive component.
The affective component of attitude is concerned about the emotional response attached to an attitude. The affective component involves a person’s feelings / emotions about the attitude object. i.e it is basically concerned with the emotional reaction of a person or customer to a particular object or good.
Hence, apple users liking the company and loving its products shows that Apple has successfully nurtured the affective component of its customers' attitude.