An engineer installs a router on a business network so that users can connect to the Internet. What configurations does the engineer use to ensure the Internet access functions correctly

Answers

Answer 1

The configurations does the engineer use to ensure the Internet access functions correctly are Logical network, Logical host ID, and Default gateway.

What is a router explained?

A router is a tool that connects or greater packet-switched networks or subnetworks. It serves the number one functions: coping with visitors among those networks through forwarding information packets to their supposed IP addresses and permitting a couple of gadgets to apply the equal Internet connection.

The Logistics Network is what hyperlinks producers, suppliers, wholesalers, outlets and consumers; and is consequently a key aspect in the Supply Chain. Transport, warehouse and distribution centre operations are what hyperlink producers to cease consumers (at once or in-at once).

Read more about the Internet:

https://brainly.com/question/97026

#SPJ1


Related Questions

3.7 Code Practice
can someone write a code for me

Answers

Answer:

Explanation:

raaaaa faraon- yt:

love shady

Type the correct answer in the box spell all words correctly.
karl has designed an interactive stories website for kids. he has implemented an alphabetical format for browsing through the stories. which
structure will he use for easy navigation?
kart implements a
structure for users to advance through the chapters.
reset
nexus

Answers

Kart should implement a main navigation structure for users to advance through the chapters.

The types of navigation.

In Computer technology, there are three main types of navigation used on websites and these include the following:

Structural navigationUtility navigationAssociative navigation

In this scenario, Kart should implement a main navigation structure for users to advance through the chapters on this interactive stories website for kids.

Read more on website here: https://brainly.com/question/26324021

#SPJ1

What is the need for computer programming?

Answers

Answer:

See Explanation

Explanation:

Programming languages use classes and functions that control commands. The reason that programming is so important is that it directs a computer to complete these commands over and over again, so people do not have to do the task repeatedly. Instead, the software can do it automatically and accurately.

Charlotte is using her teaching skills to train new employees on how to use software. the software is typically used in the engineering and technology pathway. which additional skill is she most likely using? mechanical knowledge persistence computer-aided design skills creativity

Answers

Answer:

Explanation:

c

One hint that you might be dealing with a phishing site is: a) Hidden address bar b) Fake address bar c) Misspelled text d) All the above

Answers

One hint that you might be dealing with a phishing website is: D. all the above.

What is phishing?

Phishing can be defined as a type of social engineering (cyberattack) which involves making an attempt to obtain sensitive user information, especially by disguising as a trustworthy entity in an electronic communication, which is usually over the Internet.

This ultimately implies that, some of the hints that an end user might be dealing with a phishing website include the following:

Hidden address bar.Fake address bar.Misspelled text

Read more on phishing here: https://brainly.com/question/23850673

#SPJ1

A company has dedicated a subgroup of its development team to coding the exception handling aspects of an application. what is the significance of exception handling?

Answers

Exceptional handling is the program handling in unexpected circumstances. Exceptional handling is significant as the functions showing errors could be corrected.

What is exceptional handling?

In coding exceptional handling is the method to correct the errors in the function of the application program so that it does not get crash resulting in the loss of the task of the end-user.

It can be corrected by blocking, catching the handler, and by throwing expressions. The exceptions should be handled so that abnormal termination of the application is prevented.

Therefore, exceptional handling is significant to prevent program termination.

Learn more about exceptional handling here:

https://brainly.com/question/13261436

#SPJ1

Workplace ethics include playing games. looking up things on the internet that are not work related. taking care of personal business without permission during work time. doing the work you have agreed to do while at work.

Answers

Answer:

Doing the work you have agreed to do while at work

Explanation:

I'm not sure what exactly there is to explain. The other options are not things that should be done in the workplace

A system engineer enhances the security of a network by adding firewalls to both the external network and the internal company network. The firewalls are products of two separate companies. This is an example of what type of security control practice?

Answers

Answer:

Vendor diversity

Explanation:

Different cybersecurity companies maintain different codebases, which means an exploit that might poke holes in the security of one likely won't breach the other. In this situation, the network would still have an active and effective firewall from one vendor even as the exploit from the other vendor's firewall is being patched.

software that requires a monthly subscription fee is called

Answers

Answer:

Software as a service

Explanation:

You may hear this as (SaaS) for short.

The logo for Ask search engine​
and pls no links

Answers

Answer:

Explanation:

hope it helps

The date you type at the beginning of a letter or report should be the date that the document is _____.

Answers

The date that is typed at the beginning of a letter or report should be the date that the document is:

Written

What is the Date of a Letter or Report?

Typically, the first date that is seen at the beginning of a report a document often connotes the date of writing.

For instance, if the letter or report was written today, it will bear today's date. This will help the recipient to have a clear understanding of the time frame.

Learn more about letter writing here:

https://brainly.com/question/1155995

#SPJ4

A student is going to e-mail a file she has created and needs to reduce the file size. What tool should she use to reduce the file size?

save and send

macros

compress media

save as

Answers

Answer:

Compress media

Explanation:

This zips the file into a smaller size which can now be sent. It can be decompressed to view.

When running a spelling and grammar check, which of these options in the "not in dictionary"/suggestion area does nora need to select when she wants to fix an error? add to dictionary ignore once ignore all one of the suggested words

Answers

Answer:

ignore all one of the suggested words

Answer:  D: one of the suggested words

Explanation:mines from enginuity and this is what it said hope it helps:)

Which subnet would include the address 192.168.1.96 as a usable host address?

Answers

The subnet for the address 192.168.1.96 will be 192.168.1.64/26.

What is a subnet?

The subnet in the host address is given as the logical subdivision or the partition of the IT network. It enables the computer systems to share the same internet.

The subnet for the address 192.168.1.96 will be 192.168.1.64/26. It is based on the increment with the octet it falls in.

Learn more about subnet, here:

https://brainly.com/question/15055849

#SPJ1

What is it called when you use a specific piece of data, rather than a variable, for a value that should be able to change?

a.
debugging

b.
hard coding

c.
top-down programming

d.
data encoding

Answers

Answer:

data encoding

list the parts of different engine.​

Answers

Answer:

here is the answer

Explanation:

The different parts that make up your car's engine consist of: the engine block (cylinder block), the combustion chamber, the cylinder head, pistons, the crankshaft, the camshaft, the timing chain, the valve train, valves, rocker arms, pushrods/lifters, fuel injectors, and spark plugs

Cloud Kicks wants a report Co categorize accounts into small, medium, and large based on the dollar value found In the Contract Value field. What feature should an administrator use to meet this request

Answers

The feature that the administrator can use to meet this request is known as Bucket Column.

What is a bucket column?

A bucket column is known to be formed when a person define a lot of categories (buckets) that are known to be used to group report values.

Therefore, The feature that the administrator can use to meet this request is known as Bucket Column. as one can report, sort, filter, and group via the use of bucket columns.

Learn more about accounts from

https://brainly.com/question/24756209

#SPJ1

Jake is a 6-year-old boy. his mother wants him to learn scissor skills for improving his finger grip. so, she hands him several colorful papers and a pair of scissors. jake does not have difficulty understanding which object cuts the other. what is this type of reasoning called?

a.
analogical
b.
deductive
c.
common sense
d.
inductive

please answer so brainly doesnt get rid of it.

Answers

According to this, I think it is common sense.

Zenith Computers is a software development company. It has received a random email claiming that there will be an attempt to hack and extract sensitive financial data of the company before the year end. The company has contacted you, a network analyst, to verify if such claims are indeed true. You have decided to set up a trap for the hackers by putting up a system containing false financial data. Which of the following will you use in this scenario?
A. Metasploit
B. Honeypot
C. Nessus
D. Nmap

Answers

Answer:

B. Honeypot

Explanation:

Honepots, like the name suggest, are sort of baits for the hackers. Honeypot pretty much decoys made to mimic the actual company computers. Hackers fall for it and think they hit jackpot. Once hackers try to extract info from the honeypot, the security analyst can either track the hackers to report to authorities or this is a way to distract hackers from the real protected data.

When sending a group email, how do you ensure that one or several recipients cannot see the names of other recipients?.

Answers

When sending a group email, to ensure that one or several recipients cannot see the names of the other recipient, add a Bcc box to your emails.

What is Bcc and cc field in an email?

Bcc and cc is a facility in sending an email to multiple people at one time. Bcc is added when sending multiple people, the same mail, but without knowing people the name of each other.

Cc is a field added when people can see the names of people who else got the mail.

Thus, to ensure that one or several recipients cannot see the names of the other recipient, add a Bcc box to your emails.

Learn more about Bcc and cc field

https://brainly.com/question/20525279

#SPJ1

HELP ASAP
Select the correct answer.
When designing an algorithm, what structure can be used to repeat some steps if a condition is met?
OA. iterations
OB. loops
OC. conditional
OD. flowcharts
OE. pseudocode

Answers

Answer:

B. loops

Explanation:

The while loop is used to iterate over a portion of code until a certain condition is fulfilled. Let's imagine we want to know how many times a number may be divided by two before it becomes less than or equal to one.

The main function of a(n) ____________________ is to centralize access control for the network by keeping an eye on both inbound and outbound traffic and preventing unauthorized users and malicious code from entering a network. .

Answers

Maybe the answer is “server”

who am I ?

please say me the answers

Answers

Answer:

motherboard

Explanation:

because it serves as a platform to connect all the other parts of the computer. it is where CPU, harddrive, optical drives and other expansion are directly connected.

a computer is made up of four different types of devices which are

Answers

A computer is made up of four different types of devices which are input, storage, processing and output devices.

What are computer devices?

Computer devices are those components of computer known as the computer hardware that ensures the proper functioning of the system.

The four different types of devices found in the computer are :

Input devices: These are used to put in data into the system.

Storage device:. These are used for storage of processed data.

Processing device: This is the brain box of the computer.

Output devices: They are used to display data.

Learn more about hardware here:

https://brainly.com/question/24370161

#SPJ1

Melissa is an amateur photographer and plans to post her best photos on a media-sharing network. She wants to include descriptions to identify the photos for viewers. What should she add to the photos

Answers

Melissa as  an amateur photographer should add Tags to the photos.

What is tag?

Tags is known to  be the ay that is said to be used in basic formatting tool employed in HTML (hypertext markup language) and others.

Due to the situation above, Melissa as  an amateur photographer should add Tags to the photos.

See options below

What should she add to the photos?

a. Metadata

b. Emojis

c. Tags

d. Reviews

Learn more about photographer  from

https://brainly.com/question/25821700

#SPJ1

Which organization provides a free, online html5 validator application to ensure that a webpage's html tags follow the rules for html5?

Answers

The organization provides a free, online html5 validator application to ensure that a webpage's html tags follow the rules for html5 is the W3C.

What does the W3C do?

The W3C's is known to help to create protocols and rules that makes sure that long-term  development of the Web.

Therefore, we can say that The organization provides a free, online html5 validator application to ensure that a webpage's html tags follow the rules for html5 is the W3C.

Learn more about The W3C  from

https://brainly.com/question/11179793

#SPJ1

you are running out of time and budget for your game development project you had great ideas for making a randomized highly customizable game experience with high levels of emerg but now you can only fit in the features of one of those qualities highly immersive highly randomize or highly customized briefly describe your imaginary games style then explain which of these three qualities would be best to implement in that type of game on a limited budget​

Answers

My games style  in terms of their qualities will be made up of:

Movement from Attack to Defense.Set up Defense.Movement from Defense to Attack. Set Pieces.

What is a game style?

Game style is known to be a term that is made or used by coaches, sports scientists, etc., to show the patterns of play in a scenario of team sports.

Therefore, My games style  in terms of their qualities will be made up of:

Movement from Attack to Defense.Set up Defense.Movement from Defense to Attack. Set Pieces.

Learn more about Games from

https://brainly.com/question/5144258

#SPJ1

how to transfer crypto from coinbase to coinbase wallet

Answers

Answer:

Open Coinbase Wallet on your mobile device.

Tap to go to your Settings.

Tap Buy or Transfer.

Select the supported crypto.

Enter the amount you want to transfer then tap Continue.

Follow the remaining steps to complete your transfer.

A UNIX or Linux system might identify a file as: /usr/imfst/flynn/inventory.doc. The first entry is a forward slash ( / ) representing the master directory, called the ____ directory. a.root b.working c.main d.branch

Answers

Answer:

C

i cant give you an explaination on why it is like that but C sounds and seems the correct one

if a user watches a video with event tracking three times in a single session, analytics will count how many unique events?

Answers

Answer:

1

Explanation:

Analytics will count it a One (‘1’) Unique Event, even if a user watches a video with event tracking three times but in a single session.

Other Questions
"Laboratories of democracy" is another name for the states.What is the rationale behind that nickname?A. The federal government experiments with policies by making individual states try things out.B. The term comes from the nineteenth century, when state politics were more scientific than the machine politics of cities.C. State governments use their powers to experiment with new policies.D. The states contain counties and cities, just like a test tube rack contains test tubes. What is 721.56088 rounded to the nearest thousandth? A swimming pool in a certain resort is enjoyed by people because it has a floor measurement of 8 ft by 12 ft and a depth of 9 ft. How much water can it contain? Which piece of information must be included with the graphic? its publisher and date of publication khaleds full name and grade in school several sentences describing the chart a photo to help illustrate the chart Katelyn would like to have some bracelets made for her friends. A bracelet maker charges a flat rate of $4, plus $0.75 per bracelet. Katelyn has saved $29 to for the bracelets.Please refer to the picture!! Ok Saturday a local hamburger shop sold a combined total of 234 hamburgers and cheeseburgers. The number of cheeseburgers sold was two times the number of hamburgers sold. How many hamburgers were sold on Saturday According to the line plot, what is the total amount of time the students spent studying?3 1/2 hours10 hours 4 1/4 hours 5 1/4 hours Is I did not notice thisand I did not know about thisand this is new to meandI am just finding out about this and I never knew about thisand"I didn't know about this and "I didn't see this" and "I didn't hear about this" and "I didn't notice thisand "I was not informed about this"and nobody told me about this and I was not aware of this and I was not paying attention to thisand Why did you not tell me about thisand thanks for telling me about this and I had no idea about this and I did not know this and I did not see this and I didnt hear this and this did not come to my attention and this was not brought to my attention and I was clueless about this and this was hidden from me and I was unaware about this the same andthis is a surprise to me andI thought this was the caseandI thought this was not the caseandI had no idea about thisandI had no clue about thisandI didnt have a clue about thisandthis was a surprise to meand I am surprised by thisand this was unexpected to meandthis was unexpectedthe same? What led to the Rwandan genocide?A. A decline in natural resourcesB. A homogenous populationC. The failure of the state of ArmeniaD. A polarized society Please help! Son (Her) prof de maths n'est pas bon. Il est plutt ....... Find the gradient of the graph shown why is a community needed by man ? give four example. 18 positive integers and 13 negative integers are multiplied. Why did the British allow more freedoms in places like Australia and Canada compared to places like India and South Africa?There were better resources in India and South AfricaIndia and South Africa had stronger governmentsThe British liked the geography of Canada and Australia moreMore British people had moved to Canada and Australia Question 39 of 40The circle below has a radius of 8 centimeters. What is the area of the shadedregion?X1208 cmOA. 32 square centimetersB. 8 square centimeters643square centimeterssquare centimetersO C.O D.163 The most glorious feathers of the peacock or the vibrant plumage of a bunting cannot compete with the power of a peregrine falcon or the determination of an osprey.Which words from the sentence give clues to the meaning of vibrant? Compete, power Feathers, bunting Peacock, glorious Power, falcon Which shows the pathway of the egg through the reproductive system?ovary fallopian tube vagina uterusvagina uterus fallopian tube ovaryfallopian tube ovary uterus vaginaovary fallopian tube uterus vagina How many people out of 100,000 will survive until age 90? "one drop of water leaking per second from a faucet can waste more than 2,300 gallons of water per year." the most reliable source of this information is a journalist plumber salesman scientific website Life ORientation project 2021 task 2