Frame from one LAN can be transmitted to another LAN via the device is:_____.
A) Router.
B) Bridge.
C) Repeater.
D) Modem.
E) None of the above."

Answers

Answer 1

Answer:

B) Bridge.

Explanation:

LAN refers to a local area network in which the network of computer are interconnected in less than an area which is limited i.e. school, university, residence, office building, etc

It is used to share a common line of communication within a less geographic area.

In order to transmit one LAN to the another LAN, the device we called as a bridge

Therefore the correct option is B. bridge


Related Questions

You are a network consultant who has been asked to attend an initial meeting with the executive management team of ElectroMyCycle, LLC. ElectroMyCycle manufactures motorcycles. Its new electric motorcycle was just picked up by a large retail chain. ElectroMyCycle is upgrading its manufacturing capacity and hiring new employees. Recently, ElectroMyCycle employees have started saying, "The Internet is slow." They are also experiencing problems sending email, accessing web-based applications, and printing. In the past, when the company was small, it didn’t have these problems. The operations manager outsourced computer services to a local business called Network Rogues, which installed new workstations and servers as needed, provided desktop support, and managed the switches, router, and firewall. ElectroMyCycle is now considering bringing computer services in-house and is wondering how its network should evolve as it increases production of its electric motorcycle. 1. What research will you do before your initial meeting with the executive management team?
1. Find out the industry and status of the industry the client is in.
2. Client’s market share in the industry
3. Financial growth history of the client
4. Client’s suppliers and customers
5. Products and services offered
6. Any recent important news on client’s business strategies or focus
7. What general problems does ElectroMyCycle seem to be experiencing?

Answers

Answer:

ElectroMyCycle, LLC.

The research I will do before my initial meeting with the executive management team will be to find out the following:

4. Client’s suppliers and customers

5. Products and services offered

Explanation:

My research will concentrate on the types of products and services  that ElectroMyCycle is offering its customers and raw materials that it purchases from the suppliers, because the network assets are being installed to enhance business transactions between ElectroMyCycle and its customers and suppliers.  And as the company is expanding with more suppliers and customers, more products and services, the network configuration will be built around these stakeholders.

Write, compile, and test a program named PersonalInfo that displays a person's name, birthdate, work phone number, and cell phone number.

Answers

Answer:

//import the necessary libraries

using System.IO;

using System;

//Begin class definition

class PersonalInfo

{

   //Begin main method

  static void Main()

   {

       //Declare all needed variables

       string name;

       string birthdate;

       string workphonenumber;

       string cellphonenumber;

       

       //Prompt user to enter name

       Console.WriteLine("Please enter your name");

       //Receive the user name and store in the name variable

       name = Console.ReadLine();

       

       //Prompt the user to enter date of birth

       Console.WriteLine("Please enter your birthday (dd/mm/yyyy)");

       //Receive the user date of birth and store in the right variable

       birthdate = Console.ReadLine();

       

       //Prompt the user to enter work phone number

       Console.WriteLine("Please enter your work phone number");

       //Receive and store the user work phone number

       workphonenumber = Console.ReadLine();

       

       //Prompt the user to enter cell phone number

       Console.WriteLine("Please enter your cell phone number");

       //Receive and store the user cell phone number

       cellphonenumber = Console.ReadLine();

       

       //Now display the result

      Console.WriteLine("========Your Info========");

       Console.WriteLine("Name: {0} ", name);

       Console.WriteLine("Date of birth: {0} ", birthdate);

       Console.WriteLine("Work Phone Number: {0} ", workphonenumber);

       Console.WriteLine("Cell Phone Number: {0} ", cellphonenumber);

   }

}

Sample Output

Please enter your name

>>Omobowale

Please enter your birthday (dd/mm/yyyy)

>>19/05/1990

Please enter your work phone number

>>08022222222

Please enter your cell phone number

>>08033333333

========Your Info========

Name: Omobowale  

Date of birth: 19/05/1990

Work Phone Number: 08022222222

Cell Phone Number: 08033333333

Explanation:

The code above has been written in C#. It contains comments explaining each line of the code. Kindly go through the comments. A sample output has also been provided.

Should you need the program file, please find it attached to this response.

C++

Set hasDigit to true if the 3-character passCode contains a digit.

#include
#include
#include
using namespace std;

int main() {
bool hasDigit;
string passCode;

hasDigit = false;
cin >> passCode;

/* Your solution goes here */

if (hasDigit) {
cout << "Has a digit." << endl;
}
else {
cout << "Has no digit." << endl;
}

return 0;

Answers

Answer:

Add this code the the /* Your solution goes here */  part of program:

for (int i=0; i<3; i++) { //iterates through the 3-character passCode

  if (isdigit(passCode[i])) //uses isdigit() method to check if character is a digit

           hasDigit = true;    } //sets the value of hasDigit to true when the above if condition evaluates to true

Explanation:

Here is the complete program:

#include <iostream> //to use input output functions

using namespace std; // to identify objects like cin cout

int main() { // start of main function

bool hasDigit; // declares a bool type variable  

string passCode; //declares a string type variable to store 3-character passcode

hasDigit = false; // sets the value of hasDigit as false initially

cin >> passCode; // reads the pass code from user

for (int i=0; i<3; i++) { //iterate through the 3 character pass code

   if (isdigit(passCode[i])) // checks if any character of the 3-character passcode contains a digit

     hasDigit = true;    }      //sets the value of hasDigit to true if the passcode contains a digit    

if (hasDigit) { // if pass code has a digit

cout << "Has a digit." << endl;} //displays this message when passcode has a digit

else { //if pass code does not have a digit

cout << "Has no digit." << endl;} //displays this message when passcode does not have a digit

return 0;}

I will explain the program with an example. Lets say the user enters ab1 as passcode. Then the for loop works as follows:

At first iteration:

i = 0

i<3 is true because i=0

if (isdigit(passCode[i]) this if statement has a method isdigit which is passed the i-th character of passCode to check if that character is a digit. This condition evaluates to false because passCode[0] points to the first character of pass code i.e. a which is not a digit. So the value of i is incremented to 1

At second iteration:

i = 1

i<3 is true because i=1

if (isdigit(passCode[i]) this if statement has a method isdigit which is passed the i-th character of passCode to check if that character is a digit. This condition evaluates to false because passCode[1] points to the second character of pass code i.e. b which is not a digit. So the value of i is incremented to 1

At third iteration:

i = 2

i<3 is true because i=2

if (isdigit(passCode[i]) this if statement has a method isdigit which is passed the i-th character of passCode to check if that character is a digit. This condition evaluates to true because passCode[3] points to the third character of pass code i.e. 1 which is a digit. So the hasDigit = true;  statement executes which set hasDigit to true.

Next, the loop breaks at i=3 because value of i is incremented to 1 and the condition i<3 becomes false.

Now the statement if (hasDigit) executes which checks if hasDigit holds. So the value of hasDigit is true hence the output of the program is:

Has a digit.

A friend is having a problem with keeping a fish tank at the right temperature so the fish stay healthy. Describe how you could use at least one type of input and one type of output to create a physical computing device to help this friend.

Answers

Answer:

water temperature gauge sensor

Explanation:

We can connect a temperature sensor connected to the water and a heater or cooler sensor, we have created a program to check the temperature from the sensor. when the water is hotter than recommended, we turn on the refrigerator and when it is cold, we turn on the heaterso correct answer is water temperature gauge sensor

Which of the following is true about REST?
A- In REST architecture, a REST Server simply provides access to resources and REST client
accesses and presents the resources.
B- Each resource is identified by URIs/ global IDs.
C- REST uses various representations to represent a resource like text, JSON and XML.
D- All of the above.

Answers

Answer:

D

Explanation:

REST Server simply provides access to resources and REST client accesses and presents the resources. Therefore, the correct answer is option A.

A software architectural style called representational state transfer was developed to direct the planning and creation of the World Wide Web's physical structure. REST specifies a set of guidelines for how the Web's architecture a distributed hypermedia system operating at Internet scale should function.

Therefore, the correct answer is option A.

Learn more about the REST Server here:

https://brainly.com/question/32998271.

#SPJ4

An app developer is shopping for a cloud service that will allow him to build code, store information in a database and serve his application from a single place. What type of cloud service is he looking for?A. laas(Infrastructure as a Service)B. DaaS (Directory as a Service)C. SaaS (Software as a Service)D. PaaS (Platform as a Service)

Answers

Answer:

Explanation:

We build Database Driven Web Applications tailored to your business. Consulting, UX, Dev. Database Web App Support/Maintenance Experts. Trusted for 15 years. Free Consultation.

how do u beat sonic unleashed

Answers

Answer: I guess you gotta do the fast, and then you gotta beat the things up when Sonic becomes even more of a furry ¯\_(ツ)_/¯

Explanation:

Watch playthroughs of the game.

Consider a variation of Sequential Search that scans a list to return the number of occurrences of a given search key in the list. Does its efficiency differ from the efficiency of classic Sequential Search? Explain.

Answers

Answer:

Considering the fact that the sequential search key must go through the entire list, The search is no different from a classic sequential search.

Explanation:

Sequential search is a form of search in computer science that searches for an item by comparing sequentially items in an ordered list. In big O notation, it take the sequential search O(n) time, with n being the number of items in the list.

This is the same as searching for the occurrence of an item multiple times in the list, as it must go through the entire list items.

The internal LAN is generally considered a trusted zone.
a. True
b. False

Answers

Answer:

Option A:

True

Explanation:

The internal LAN is generally considered a trusted zone because it is only accessible by a limited number of users each with a specific administrative privilege. Reduces the occurrence of threats to the system as most of the users are profiled, documented, and well known.

It is a lot more difficult to hack into an internal LAN because of its closed nature, with only a limited number of devices connected. Tracing the source of a security breach is also a lot easier compared to a Wide Area Network.

If you see or hear of information in the media or on the internet that you suspect is classified, what should you do?

Answers

Answer:

Do not comment on the information or discuss with unauthorized recipients.

Explanation:

As a rule, it is pertinent to have the knowledge that when working with information that are sensitive, one has to be very careful to know and understand what information to share , what not to share and who the recipient should be.

Unauthorized disclosure is when classified information are transfered to unauthorized persons or recipients. Classified information are information not meant for public knowledge which if disclosed, could undermine national security. To be a recipient of classified information, there must be an execution of approved non disclosure agreement, certification of favorable eligibility must be obtained and also possession of the need to know for the classified information.

how do media and networks interact

Answers

Answer:

Media are connected to networks that make information easier to access and pass on.

the task is to ask the user for three numbers and find the average which pseudocode gives you the comment outline for task​

Answers

Answer:

#ask the user for three numbers,

#add the numbers,

#divide by 3,

#print the average

Explanation:

In order to get the average you must add all the numbers together then divide by how many numbers there are




analyze the given code

For I = 1 to n

For j = 1 to n

C =[i.j] = 0

For k=1 to n

C[i.j] = c [i.j] + a[i.k] * b[k.j]

End

End

end

Answers

Answer:

Following are the description to the given code:

Explanation:

In the given code, three for loop are used that uses the variable "I, J, and K", which starts from 1 and ends when it equal to the value of the "n".

Inside the "I and J" loop, another variable "C" is defined, which uses "i,j" and assign a value, that is equal to 0. In the "k" loop, it uses the "c[i.j]" to multiply the value of "a[i.k] and b[k.j]".

In other words, we can say, it calculates the multiplication of the matrix and stores its calculated value.

Answer gets the brainliest!!! Choose the venues where audiovisual materials can be found today. (Select all that apply.) schools the internet stores businesses doctors’ offices homes

Answers

Answer:

doctors offices

internet stores buisnesses

Explanation:

Audio Visual Materials (AVMs) are those things can be understood by observing visual aspect of anything's. According to The Librarian Glossary (1987) “AVMs as non-book materials like tapes, slides, films which are renewed and recent to rather then read as books.”

How do others see technology?

Answers

It honestly depends. A lot of people could have different technology views. Imagine this: you meet 2 people. One person loves technology and the other person fears it.

write a python function that takes the largest and smallest numbers in a list, and swap them (without using min() or max() )

Answers

Answer:

def SwapMinMax ( myList ):

   myList.sort()

   myList[0], myList[len(myList)-1] = myList[len(myList)-1], myList[0]

   return myList

   

Explanation:

By sorting the list, you ensure the smallest element will be in the initial position in the list and the largest element will be in the final position of the list.

Using the len method on the list, we can get the length of the list, and we need to subtract 1 to get the maximum element index of the list.  Then we simply swap index 0 and the maximum index of the list.

Finally, we return the new sorted list that has swapped the positions of the lowest and highest element values.

Cheers.

Jake is preparing his resume. He is applying for the position of iOS application developer at a large software company. He wants to include his expertise in C++ and Java. Which sub-heading should he use? A. User-centric Design Skills B. Cross-Platform Development Skills C. Modern Programming Language Skills D. Agile Development Skills

Answers

Answer:

C. Modern Programming Language Skills

Explanation:

Multiple Single SNMP managers are communicating with a single SNMP agent in:_____.

Answers

Answer:

many-to-many

Explanation:

Many-to-Many Communication is a term that describes a form of online or over the internet communication whereby numerous users are sending and receiving information, in such a way that the recipient does not have the idea of who the receiver is, and neither does the receiver know who the sender is, even though the information facets frequently connects through various websites.

Hence, Multiple Single SNMP managers are communicating with a single SNMP agent in "many-to-many communication."

Computer ForensicsThere are many differences between public-sector and private-sector computer investigations. What do you see are the top three and why?

Answers

Answer:

For a private computer investigation into cyber crime the private sector  should complete all its courses and must be certified by the relevant authorities and must also be an expert in the computer investigations. while

Public computer investigations has more aspects that involves non-certified personnel's

The private-sector computer investigations are used mostly on all the cyber crimes and hacking and loss of business data.while public-sector computer investigations are used on crimes like rapes, accidents and murders crimes

Explanation:

Computer forensics are used to resolve crimes like cyber crime, hacking, malfunctions and data interrupts.

Before a private computer investigations which is into cyber crime investigation can continue, the private sector  should complete all its courses and must be certified by the relevant authorities and must also be an expert in the computer investigations. while

Public computer investigations has more aspects that involves non-certified personnel's and the personnel's are not necessarily supposed to complete the courses

The private-sector computer investigations are used mostly on all the cyber crimes and hacking and loss of business data.while public-sector computer investigations are used on crimes like rapes, accidents and murders crimes

What is one advantage of a magnetic hard drive as compared to a solid state drive?
O It won't be harmed if you drop your computer.
O It spins faster.
O It is open source.
O It is less expensive.

Answers

I’m not 100% sure about this but it it’s D or B

You work for a company that is losing sales because it takes days to manufacture products. What technology can you suggest the company use to speed production?

Answers

Answer:

i guess artificial intelligence or robots

The technology can you suggest the company use to speed production is Computer-aided manufacturing.

What is Computer-aided manufacturing?

Computer-aided manufacturing (or CAM for short) is the use of numerical control (NC) software applications with the aim of creating detailed instructions (G code) that drive computer numerical control machine tools ( CNC) for fabrication parts. Manufacturers in many different industries rely on CAM capabilities to produce high-quality parts.  

A broader definition of CAM may include the use of computer applications to define a manufacturing plan for tool design, computer aided design (CAD), model preparation, NC programming, inspection programming coordinate measuring machines (CMM), machine tool simulation or post-processing. The plan is then executed in a production environment, such as direct numerical control (DNC), tool management, CNC machining, or CMM execution.

Therefore, The technology can you suggest the company use to speed production is Computer-aided manufacturing.

Learn more about technology on:

https://brainly.com/question/28288301

#SPJ2

Which Compatibility Modes setting is available for Photoshop?

Answers

Answer:

k

Explanation:

Explain a business scenario where management information systems plays a part.

Answers

Answer:

In this article, we'll cover what is happening with MIS in both business and ... is when you're notified or your credit card is frozen, depending on the situation.

Explanation:

Assign secretID with firstName, a space, and lastName. Ex: If firstName is Barry and lastName is Allen, then output is:

Answers

Answer:

I'll answer this question using Python

firstName = input("First Name: ")

lastName = input("Last Name: ")

secretID = firstName+" "+lastName

print(secretID)

Explanation:

This line prompts user for first name

firstName = input("First Name: ")

This line prompts user for last name

lastName = input("Last Name: ")

This line calculates secretID

secretID = firstName+" "+lastName

This line prints secretID

print(secretID)

Answer:

My name is Barry Allen, and I am the fastest man alive. When I was a child I saw my mother killed by something impossible. My father went to prison for the murder. Then an accident made me the impossible. To the outside world, I’m an ordinary forensic scientist, but secretly, I use my speed to fight crime and find others like me. And one day, I’ll find who killed my mother and get justice for my father. I am the Flash.

Explanation:

My name is Barry Allen, and I am the fastest man alive. When I was a child I saw my mother killed by something impossible. My father went to prison for the murder. Then an accident made me the impossible. To the outside world, I’m an ordinary forensic scientist, but secretly, I use my speed to fight crime and find others like me. And one day, I’ll find who killed my mother and get justice for my father. I am the Flash.

Which of the following is the process of writing the step-by-step instructions that can be understood by a computer?

Answers

Answer:

The process should be called an algorithm!

Where must virtualization be enabled for VM (virtual machine) software to work?
a) Windows Control Panel
b) BIOS/UEFI
c) TPM Chip
d) Jumper

Answers

Answer:

b) BIOS/UEFI

Explanation:

Virtualization can be defined as a technique used for the creation of a virtual platform such as a storage device, operating system, server, desktop, infrastructure or computing resources so as to enable the sharing of resources among multiple end users. Virtualization is usually implemented on a computer which is referred to as the "host" machine.

Generally, virtualization must be enabled in the BIOS/UEFI for VM (virtual machine) software to work.

BIOS is an acronym for Basic Input/Output System while UEFI is an acronym for Unified Extensible Firmware Interface. BIOS/UEFI are low-level software that serves as an intermediary between the operating systems and the computer's firmware or hardware components. The UEFI is actually an improvement of the BIOS and as such is a modernized software.

Basically, the BIOS/UEFI is a software which is an essential tool or feature which must be enabled to link the virtual machine with the hardware components of the computer.

Which command displays the contents of the NVRAM?

Answers

Answer:

Explanation:

NVRAM (nonvolatile random-access memory) is a small amount of memory that your Mac uses to store certain settings and access them quickly. And to show the content of the NVRAM

Show startup-config will display NVRAM content

TLO 06 Active Directory Domain and Trusts tool is used to move servers between site in an AD Infrastructure.a. Trueb. False

Answers

Answer:

b. False

Explanation:

Active Directory Domain and Trusts tool is used for the following operations:

1. To increase the domain functional level

2. To increase forest functional level

3. To add UPN suffixes

4. To manage domain trust

5. To manage forest trust.

Hence, the correct answer is: it is FALSE that Active Directory Domain and Trusts tool is used to move servers between site in an AD Infrastructure

Create a query that will list all technician names, employee numbers, and year hired in order by year hired (Newest to Oldest).

Answers

Answer:

SELECT TECHNAME, EMPNUM, YEAR FROM EMPLOYEE ORDER BY YEAR DESC

Explanation:

The table definition is not given;

However, I'll make the following assumptions

Table Name:

Employee

Columns:

Technician name will be represented with Techname

Employee number will be represented with Empnum

Year Hired will be represented with Year

Having said that; the sql code is as follows:

SELECT TECHNAME, EMPNUM, YEAR FROM EMPLOYEE ORDER BY YEAR DESC

The newest year hired will be the largest of the years;

Take for instance:

An employee hired in 2020 is new compared to an employee hired in 2019

This implies that the year has to be sorted in descending order to maintain the from newest to oldest.

Addition and subtraction are considered to be ____ operations performed by a computer.

Answers

Answer:

Mathematical operations

Other Questions
A train travels a 400-km route and makes five stops in seven hours. Which equation is used to calculate the trains average speed?A.Average speed = Sum of instantaneous speedsB.Average speed = Total distance x Total timeC.Average speed = Total distance + Total timeD.Average speed = Total distance Total time Amy simplifed this complex fraction problem. Negative 2 and one-half divided by five-fourths = Negative five-halves divided by five-fourths = negative five-halves (five-fourths) = negative StartFraction 10 over 8 EndFraction. The quotient is negative five-fourths. What errors did Amy make? Select all that apply. A(n) _________ is something that represents an idea or object to help people better understand it.theorymethodmodelobservation 7 < 12 + c < 13Pls help me show work Why do archaeologists think these ancient people wereequal? Sammy's bedroom has the dimensions 9 feet by 15 feet. If the ceiling is 11 feet, what is the area of the smallest wall? I will cash app you $10 to help me with thisconsider australian wildfire. write the effects of the wildfire on the environment and climate. Also mention the measures to get life to normal. Write 10 sentences Find the volume (in mL) of a substance that has a mass of 11.6 g and a density of 0.81 g/mL. Give your answer with two decimals. Jill has found evidence that suggests that individual volcanoes produce igneous rocks with a certain chemical signature. She predicts that scientists could use an igneous rock's chemical signature to determine where the rock came from. What type of investigation should Jill perform to test her prediction? All the adjectives to that sentence The zany scientist performed odd experiments to entertain the audience. This country controlled most of the land in America by the mid-1500's?a.Spainc.Franceb.Portugald.England skip count 3 times by hundreds. skip count 2 times bytens. there is a 9 in the ones place. the number is? Name the explorer who discovered the Pacific Ocean after crossing the Isthmus of Panama.Ferdinand MagellanFrancisco PizarroHernando CortesVasco Nuez de Balboa Discuss the context and significance of the following quote, He told me of an ancient feud between two brothers which split all the world between darkness and light. And I, Grendel, was the dark side, he said in effect. The terrible race God cursed. I believed him. Such was the power of the Shapers harp! (51) What story is he referring to? Why does he believe in it as well, even though Grendel is so cynical? What power does the Shaper seem to have and why? At the beginning of the season, Jamie pays full price for a ticket to see Panters, her favorite baseball team. The Panthers currently have 33 wins and 31 losses. A. Represent the total change in the cost of a ticket given in their losses. B. What is the cost of a ticket for the next game they play? Should leadership be the manager's job or should leadership be a shared process? An atom of a certain element has 36 protons, 36 electrons, and a mass number of 84, Atroom temperature this element is a very stable gas. How many neutrons are in this atom? What should a health care worker do first if a patient start falling Mr. and Mrs. Perry own three personal residences, all of which are subject to an acquisition mortgage. The mortgage on the first residence is $290,000, the mortgage on the second residence is $400,000, and the mortgage on the third residence is $357,000. Which of the following statements is true? A. Mr. and Mrs. Perry can report an itemized deduction for the interest paid on all three mortgages. B. The Perrys itemized deduction is limited to the interest on $1 million of their acquisition debt. C. The Perrys itemized deduction is limited to the interest on the $400,000 mortgage. D. None of the statements is true. Which of the following best describes hypothermia?A. Unlikely when the temperature is above freezing.B. A potentially fatal drop in core body temperature.C. A potentially fatal high body temperature.D. Always, always fatal.