1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
uysha [10]
3 years ago
12

HELP ASAP WILL GIVE BRAINLY Question 19 Multiple Choice Worth 5 points) (05 03 MC) Network technologies specialist Hannah has be

en asked allow several machines on different subnets to communicate with each other using broadcasts What does she need to configure? RIP version 1 using Internet Protocol Version 4 (TCP/IPv4) O RIP version 1 using Internet Protocol Version 6 (TCP/IPV6) RIP Version 2 using internet Protocol Version 4 (TCP/IPv4) RIP Version 2 using internet Protocol Version 5 (TCP/IPV6)​
Computers and Technology
1 answer:
nasty-shy [4]3 years ago
4 0

Network technologies specialist Hannah would need to configure: C. RIP version 2 using Internet Protocol Version 4 (TCP/IPv4).

<h3>What is RIP?</h3>

RIP is an acronym for Routing Information Protocol and it can be defined as an intradomain routing protocol which is typically designed and developed based on distance vector routing.

<h3>The types of RIP.</h3>

In Computer networking, there are two main types of Routing Information Protocol (RIP) and these include:

  • RIP version 1.
  • RIP version 2.

RIP version 2 are generally designed and developed to include subnet masks unlike RIP version 1. Thus, Hannah would need to configure RIP version 2 using Internet Protocol Version 4 (TCP/IPv4) allow several machines on different subnets to communicate with each other using broadcasts.

Read more on routing protocol here: brainly.com/question/24812743

You might be interested in
All of the different devices on the internet have unique addresses.
Sindrei [870]

Answer:

Yes

Explanation:

Just like a human fingerprint, no 2 computers are the same.

3 0
3 years ago
Discuss Hashing and how it is utilized within the IT industry. Also, discuss how Hashing can improve our sorting and searching r
shusha [124]

Answer:

Hashing can be termed as the alteration of a string of characters into a frequently smaller fixed-length value or key that represents the original string.

Explanation:

Hashing are utilized to catalog and recover digital items in a database since it is quicker to find the item using the shorter hashed key than finding the items using the original value.

5 0
3 years ago
Write a C++ program to build a simple calculator<br>(+،-،*،/) using switch statement?​
Mars2501 [29]

Answer:

Check explanation

Explanation:

# include <iostream>

using namespace std;

int main()

{

   char op;

   float a, b;

   cout << "Enter operator either + or - or * or /: ";

   cin >> op;

   cout << "Enter two operands: ";

   cin >> num1 >> num2;

   switch(op)

   {

       case '+':

           cout << a + b;

           break;

       case '-':

           cout << a - b;

           break;

       case '*':

           cout << a * b;

           break;

       case '/':

           cout << a / b;

           break;

       default:

           cout << "This operator is not valid. Please try again.";

           break;

   }

   return 0;

}

4 0
3 years ago
areas in which there has been significant technological advancement (electricity, transportation, communication, etc.)?
Scilla [17]

Answer:

transportation,communication,health care and agriculture

Explanation:

transportation through the provision of vehicles

comminication through the use of mobile

phones and laptops

health care through the use of machines and incubators

agriculture through the use of tractors and fertilizers

4 0
3 years ago
g Consider a disk queue with requests for I/O to blocks on cylinders 95, 120, 41, 122, 15, 142, 65, 167. The Shortest Seek Time
yawa3891 [41]

Answer:

follows are the solution to the given question:

Explanation:

Please find the image file for the SSTF scheduling algorithm.

Following are the requested order:

Request \ \ order :\\\\95\\120\\122\\142\\167\\65\\ 41\\15

Calculating the Total Head Movement:

= (100-95) + (120-95) + (122-120) + (142-122) + (167-142) + (167-65) + (65-41) + (41-15)\\\\= 5 + 25 + 2 + 20 + 25 + 102 + 24 + 26\\\\= 229

6 0
3 years ago
Other questions:
  • Most input/output devices communicate with components inside the computer case through a wireless connection or through cables a
    8·1 answer
  • Poems Roses are red,
    15·1 answer
  • Write a program that meets the following requirements.
    15·1 answer
  • As a computer science student, which career you will select and what do you predict about the future of that specific IT-Career.
    8·1 answer
  • Haya noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very
    7·1 answer
  • Write the Java code to simulate an inventory control system and a point of sale system with customer history On program start, e
    5·1 answer
  • What does the image depict:
    14·1 answer
  • Write an algorithm (pseudo-code) that takes an unsorted list of n integers and outputs a sorted list of all duplicate integers.
    6·1 answer
  • What was the strategy the company adopted for ERP implementation?
    12·1 answer
  • A safety procedure that enables a trusted party to have a copy of the encryption key is called key __________.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!