1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anika [276]
2 years ago
9

Designing a medium to large network requires a combination of technologies and there isn't one "right way." Think about the tech

nologies you would need to deploy to implement a college campus network with multiple buildings, hundreds of faculty and staff, and dozens of computer-equipped - classrooms and labs. Think of the ancillary technologies you might need to integrate into the network such as data projectors, smart whiteboards, campus security systems, and so forth. Consider consulting with the IT staff at your school or another school to see what technologies they use. Instructions: Write a post of at least four paragraphs outlining the technologies you would use to connect student and faculty computers, servers, multiple buildings and so forth.​
Computers and Technology
1 answer:
allochka39001 [22]2 years ago
7 0

Technology allows for easy accessibility, communication and information technology could connect student and faculty computers and servers.

<h3>What is computer networking?</h3>

It is the ability of computers to communicate with one another. It makes use of a communication technology that would allow different computers to be connected to each other.

Technologies that will be used include,

  • Communication technology
  • Information technology

The different types of networking systems that can be used for communication and information include,

  • Local area network
  • Wide area network
  • Computer area network

Local Area Network (LAN):  It is a computer network that can be used in a small confined area such as a school, laboratory, office, or group of buildings.

Thererfore, technologies you would use to connect student and faculty computers, servers, multiple buildings include communication and information technology.

Learn more on technology here,

brainly.com/question/23418761

You might be interested in
What can the tab key do
bulgar [2K]
Answer: it indents

Explanation:
8 0
3 years ago
What might a programming prefer the top-down approach to programming design?
navik [9.2K]

Top down program design is an approach to program design that starts with the general concept and repeatedly breaks it down into its component parts. In other words, it starts with the abstract and continually subdivides it until it reaches the specific. Consider creating the prime factorization of a number like 1540. The steps involved might look like:

1540

2 x 770

2 x 2 x 385

2 x 2 x 5 x 77

2 x 2 x 5 x 7 x 11

Top down program design works the same way. We start with the overall objective and wind up with a series of steps needed to accomplish it.

3 0
4 years ago
A user is unable to install virtualization software on a Windows 8.1 computer. The user verified the host has sufficient RAM, pl
Phantasy [73]

Answer:

The correct option is C. The user does not have a valid product license key. Both the OS installed on the bare metal (that the host) and the client OS must have a valid license key.

Explanation:

There is a powerful virtualization tool is built into every copy of Microsoft Windows 8.x Pro and Windows 8.x Enterprise, Client Hyper-V.

This is the very same Type-1 hypervisor that runs virtualized enterprise workloads and comes with Microsoft Windows Server 2012 R2. The virtual machines you create on your desktop with Client Hyper-V are fully compatible with those server systems as well.

If you need to do testing as a software developer, or simply want an additional operating system(s) running on your computer, such as Linux, Hyper-V can be a great feature to have enabled on your PC.

To have the Hyper-V feature on your PC, you'll need to meet some basic requirements like your computer will need 4GB of RAM with a 64-bit processor that has Second Level Address Translation (SLAT).

Many PCs on the market have this feature, while many PC BIOSes have virtualization features turned on by default, your PC might not.

As BIOS menu layouts are not universal, you'll want to consult your PC BIOS documentation as to where the feature is located in your firmware setup and what it is called.

a.   Windows 8.1 does not support Type 2 hypervisors.

 This option is wrong. All 64-bit Windows 8.1 OS except for the Home version supports hypervisors type 2 as well as type 1

b.   The motherboard does not support hardware-assisted virtualization.

Most of the PC that can run Windows 8.1 has visualization, all that is needed is to have it enabled if it was it enabled by default in the BIOS

c.   The user does not have a valid product license key.

This is the correct answer. For you to successfully install visualization software on Windows 8.1, both the host OS and the client OS must have a valid product key

d. The system is incompatible with Type 1 hypervisors.

This option is wrong. The Windows 8.1 OS does not only support the installation of visualization software, it came with its hypervisor called Hyper-V.

7 0
3 years ago
Fill in the blank; "As well as their traditional role of computing data, computers are also extensively used for..."
Vikki [24]

Answer:

Information output and information storage

Explanation:

Output in the form of images, audio, printed on paper, video, 3D models, etc

Storage - saving information internally on hard drive and externally (HDD, SSD, RAID system, etc

6 0
3 years ago
Explain the term computer output​
fomenos

Answer:

Computer output simply put is any data generated by the computer or feedback gotten from the computer. Output can take many forms, but there are 2 major categories:

- Soft copy output e.g text viewed on a computer screen

- Hard copy output e.g printouts

Explanation:

6 0
3 years ago
Other questions:
  • When you use a script to create all of the tables for a database, you must start with the tables that don't have _______________
    15·1 answer
  • What are the best data structures to create the following items? And why?
    13·1 answer
  • 2) Search the Web for two or more sites that discuss the ongoing responsibilities of the security manager. What other components
    15·1 answer
  • ______ is a disadvantage of EDI.
    8·1 answer
  • Circular errors are caused by adding the cell name of a/an _______ cell to a formula.
    6·2 answers
  • What is the purpose of a career portfolio?
    6·1 answer
  • Before posting a picture online, make sure to
    7·1 answer
  • Tradegy deals with _____
    14·1 answer
  • What does this function do in the code?
    5·2 answers
  • What safety do you need to have ready to start a device repair?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!