Your company is a small start-up that has leased office space in a building shared by other businesses. All businesses share a common network infrastructure. A single switch connects all devices in the building to the router that provides internet access. You would like to make sure that your computers are isolated from computers used by other companies. Which feature should you request to have implemented

Answers

Answer 1

Answer:

VLAN

Explanation:

In this specific scenario, you should request that a VLAN is implemented at the location. This is a feature that allows you to connect a group of computers to the same network but at the same time make sure that your computers are separate from other groups of computers in the network. This acts as an entire LAN network with specific protection for each group of connected devices. This allows you to pick and choose which groups get allowed access and which ones are isolated from your network.


Related Questions

After a chart has been inserted and formatted, is it possible to change the data range it refers to or to add new rows of data?

No, additional data cannot be included in a chart once it has been created; the user should delete the chart and create a new chart.
Yes, click the Select Data button in the Data group under the Design tab to extend or reduce the data range.
Yes, click the chart, select the additional rows or columns of data to add, and press Enter on the keyboard.
Yes, double-click the chart and select Properties from the list; in the Properties box, insert the new data range to include in the chart.

Answers

Answer: Yes, click the Select Data button in the Data group under the Design tab to extend or reduce the data range.

Explanation:

Excel allows one to be able to update the data in a graph because the designers knew that information needs to be updated sometimes.

This is why there is an option to use the Data button in the Data group which is under the Design tab to increase or decrease the data range that is to be used in the chart which means that a new row of data could even be added.

there are 9 CTSOs, name 3

Answers

Bjhfjjhhuuhhggghhhhhh
Business Professionals of America.
DECA.
Family, Career and Community Leaders of America.

Which of these is NOT an input device?
O keyboard
O mouse
O blinking light
O microphone

Answers

Blinking light is not one of the awansers

Helpppppppppppppphuhuh

Answers

Answer:

B

Explanation:

You listed this as Computers and Technology where we post coding questions, or hardware related things, but ok.

If there is 7/8 jugs as the starting amount, and they have a 1/2 jug, dividing 0.875 by 0.5 gives the answer of 1.75 or 1 3/4.

Which of these are part of the CPU?
O peripheral
O HDMI cord
O core
O keyboard

Answers

Hiii I think the best option would be C. Core

What does this mean? it is coming after i ask a question

Don't use such phrases here, not cool! It hurts our feelings :(

Answers

Answer:

To my own opinion I think it means that when you're answering a question here in brainly I think they are referring that your message is rude but sometimes you are not rude but I don't know. Maybe it could be some difficult technical problems.

the contribution of Charles Babbage in the history of computer​

Answers

Charles Babbage also known as the “father of computers” have made an incredible contribution in the evolution and history of computers. His most well-known invention, the analytical engine was a proposed mechanical general-purpose computer with complex machinal working features. Today, most computers follow Charles Babbage’s analytical engine’s process of working (IPO). Charles Babbage was the one to originate the concept of a digital programmable computer. Other mentionable invention of Charles Babbage is difference engine.


Plz give me the brainliest :)

Mary uploaded some images on her website. She chose an image and downloaded it. She found that the image she saw on screen did not seem to have the same DPI as when she had scanned it (she had uploaded a scanned image with 300 DPI). What could be reason with this visual decrease in DPI on the computer screen? (Correct Answer only)

A. Some image resolution was lost while uploading it
B. She downloaded a compressed version of the image.
C. The computer reset the resolution of the image.
D. Her file was probably corrupted while downloading.
E. Computer screens typically display images of only 72 DPI.

Answers

It could be A or B, with a guess that it’s A. Many websites require images to be compressed on uploading so that it takes less of the site’s database storage, but the wording leads me to believe it may be B. Any thoughts?

The reason for this visual decrease in DPI on the computer screen is some image resolution was lost while uploading it. The correct option is A.

What is resolution?

Resolution is the quality of the image that we see in the screen. It is the number of pixels per inch of space. The meaning of PPI is pixel per inch. When a high-resolution picture is seen, it means there are more pixels per inch.

When a picture is downloaded from a site. It does not download in the original pixels because during downloading some pixels are lost due to slow net or the settings of the computer. And a compressed version does not download on its own, and corrupted files do not affect the resolution.

Thus, the correct option is A. Some image resolution was lost while uploading it.

To learn more about resolution, refer to the link:

https://brainly.com/question/15189307

#SPJ5

write a c program to display the series: 1,8,27,64,125​

Answers

num_list = [1, 8, 27, 64, 125]

for x in range ( len( num_list) ) :

print (num_list[x])

You have been asked to help a small office with a limited budget set up and configure a Windows network. There are only five computers in this office. In addition to the ability to share network resources, security is a top priority.
Which of the following is the BEST course of action in this situation?
A. Install a HomeGroup to provide a single login and simplify security and sharing.
B. Install a WorkGroup to provide a single login and simplify security and sharing.
C. Install a WorkGroup to allow each device to control what is shared and with whom.
D. Install a HomeGroup to allow each computer to control which items are shared and who can access them.

Answers

Answer:

I will choose a option tin best

Answer: Install a WorkGroup to allow each device to control what is shared and with whom.

Explanation:

Analog computers are general purpose computers : true ? or false ?​

Answers

Answer:

false

Explanation:

Analog Computer is functioned to do mathematical model of analog computers. This model consists several basic units which are interconnected in order to compute some function.

You are working as a Solutions Architect in a large healthcare organization. You have many Auto Scaling Groups that you need to create. One requirement is that you need to reuse some software licenses and therefore need to use dedicated hosts on EC2 instances in your Auto Scaling Groups. What step must you take to meet this requirement

Answers

Answer:use launch template with your ASG

Explanation:

Sophie often makes grammatical errors in her document. Which feature of the Spelling and Grammar tool can she use to understand the errors? A. Next Sentence B. Options C. Change D. Explain

Answers

Answer:

D. Explain

Explanation:

Sophie would need an explanation of why she makes grammatical errors to understand the errors.  

Marcus White has just been promoted to a manager. To give him access to the files that he needs, you make his user account a member of the Managers group, which has access to a special shared folder. Later that afternoon, Marcus tells you that he is still unable to access the files reserved for the Managers group. What should you do

Answers

Answer:

log off of his account and log back in

Explanation:

The first thing that Marcus should do would be to log off of his account and log back in. This is so that the new changes to his permissions can take effect. This should solve his problem and grant him access to all the permissions available in the Managers Group. If this does not work, then it is most likely that he is still in the previous group which has the Manager level permissions blocked. In this case he would need to leave the previous group that he is in because the blocking permissions overrides the access allowed from the Managers group.

What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any program designed to do harm a type of software designed to track activity online

Answers

Answer:

any program designed to do harm.

Explanation:

Malware is a program that was created by someone with malicious intent. Malware can target your windows system files and damage windows(or what ever os you use). Malware can corrupt files and even lock you out of your computer.

You are in charge of installing a remote access solution for your network. You decide you need a total of four
remote access servers to service all remote clients. Because remote clients might connect to any of the four
servers, you decide that each remote access server must enforce the exact same policies. You anticipate that
the policies will change frequently.
What should you do? (Select two. Each choice is a required part of the solution.)
A. Configure network policies on the RADIUS server.
B. Make each remote access server a member of the RemoteServers group.
C. Configure the exact same network policies on each server.
D. Configure one of the remote access servers as a RADIUS server, and all other servers as RADIUS clients.
E. Use Group Policy to configure network policies in the default Domain Controllers GPO.
F. Configure each remote access server as a domain controller.

Answers

Answer: configure one of the remote access servers as a RADIUS server and all other servers as RADIUS clients

configure network access policies on the RADIUS server

Explanation:

Ben is working in an IT services organization that uses the National Institute of Standards and Technology (NIST) functional impact categories to describe the impact of incidents. During a recent construction project, a contractor plugged a network device to the same switch twice, resulting in a network loop and taking down the organization's network for one-third of its users. Which functional impact category should Ben use to classify the event given in the scenario

Answers

Answer:

Medium

Explanation:

The functional impact category in NCCIC Cyber Incident scoring system considers incident impact to the organization. This category isn't severe and can result from such things as minor network breakdowns in the organization. It is given a priority score according to the scoring system of medium which is yellow in the priority level.

explain the types of computer on the basis of model

Answers

XT(extra technology) computer: it cannot support GUI Based operating system. its processing speed is 477MHz

AT(advanced technology):it supports GUI Operating system. Its processing speed is 2GHz

PS/2:is a laptop computer which is rechargeable

and battery powered. it's operated with OS/2 operating system.

PLEASE MARK AS BRAINLIEST

Answer:

XT Computers (Extended Technology)  

AT Computers (Advanced Technology)

PS/2 Computers (Personal System 2)

Explanation:

XT Computers :  

            The computers having 8086 or 8088 microprocessor and processing speed of 4.77 Mhz are known as XT Computers. These computers are outdated now because they cannot run on latest software versions.

AT Computers :  

                  The computers having 80286 or later versions of microprocessors are known as AT Computers. Their storage capacity as well as speed is much higher than XT computers. Besides that they have math  co-processor to support main processors to perform complex mathematical calculations.

PS/2 Computers:

                  IBM developed another model of computer in 1990 that have much advanced architecture design that AT computers. They are known as PS/2 computers. They are much faster than AT computers. Most of the laptop computers based on PS/2 model use OS/2 or UNIX operating system and 1.44 MB floppy diskette.

explain about third generation of computer​

Answers

Answer:

The period of third generation was from 1965-1971. The computers of third generation used Integrated Circuits (ICs) in place of transistors. ... This development made computers smaller in size, reliable, and efficient. In this generation remote processing, time-sharing, multiprogramming operating system were used.

Explanation:

hope it helps

convert (0.255)¹⁰ into binary

Answers

0.01000001010001111011

Must click thanks and mark brainliest

Which of the following stores the operating system?
O Von Neumann center
O Bluetooth center
O the cloud
O random access memory

Answers

Answer:

The Cloud

Explanation:

Clouds are basically computers offsite.  The cloud is used for many things, Like storage, to running applications which needs an operating system to work. Just like the device you are using right now to use Brainly. It needs an operating system to install a web broswer or app to acess a service. Hope this helps!

what is known as Ip address

Answers

Answer:

IP address stands for internet protocol address; it is an identifying number that is associated with a specific computer or computer network. When connected to the internet, the IP address allows the computers to send and receive information.

Predict the output... LET A= -20.50 LET B = ABS(A) PRINT B END​

Answers

Answer:

full and then I would like this

Which of the following are characteristics of centralized version control systems? Select 3 options.

A full copy of all project files is stored on each developer's computer.

Changes to the project are stored in a log file on each developer’s computer.

It allows many developers to work on the same project from anywhere at the same time.

Project files are maintained in a central repository.

The process may require file locking, depending on file type.

Answers

Answer:

It allows many developers to work on the same project from anywhere at the same time

Project files are maintained in a central repository

The process may require file locking, depending on file type

Explanation:

The two main types of version control system are the centralized version control system and distributed control system

The centralized version control system is a control system whereby all programmers work on and make their individual changes to a single single copy of the project stored and maintained in a central repository, such as a server

In order to solve the problem of several developers working on each others work simultaneously, a centralized version control system makes use of the lock-modify-unlock model

The three options are therefore;

It allows many developers to work on the same project from anywhere at the same time

Project files are maintained in a central repository

The process may require file locking, depending on file type

Answer:c d e

Explanation:

why the internet is not policed​

Answers

Answer:

The Internet allows people to circumvent law by committing criminal acts from areas where their activities are not illegal. Those areas will always exist, and thus new regulations will be just as ineffective as the old ones are ["Net Needs Law Enforcement, Author Says,"]. But Internet traffic is marked with IP addresses, and those addresses can be tied to specific networks with specific locations. Shouldn't it be possible to separate traffic based on the originating network and treat data coming from relatively insecure locations differently than data coming from relatively secure locations? It would be much harder for someone in a rogue nation to hack a network if he had to hack an intermediary network first. And unlike government regulation, which has zero impact in areas where these threats are likely to originate, separating traffic by location might actually work

write a program to check the password( qbasic)​

Answers

Answer:

Assuming this is in python:

def check_password(password):

   

   correct_password = "qbasic"

   

   if password == correct_password:

       return True

   else:

       return False

def main():

   

   user_input = input("Type in your password: ")

   

   if check_password(user_input):

       print("Correct!")

   else:

       print("Wrong, try again")

     

       

main()

Explanation:

Hope this helped :) If it wasn't suppose to be in python, tell me so I can make it in the correct programming language.

Have a good day :)

4. Calculate the standard deviation for the following data set: Foundations of Technology Engineering byDesi OITEEA . . Data Set = 4, 14, 6, 2, 7, 12 217 ,​

Answers

Answer:

[tex]\sigma_x = 5.68[/tex]

Explanation:

Given

[tex]x = 4, 14, 6, 2, 7, 12 2,17[/tex]

Required

The standard deviation

First, calculate the mean

[tex]\bar x =\frac{\sum x}{n}[/tex]

So, we have:

[tex]\bar x = \frac{4+ 14+ 6+ 2+ 7+ 12 +2+17}{8}[/tex]

[tex]\bar x = \frac{64}{8}[/tex]

[tex]\bar x = 8[/tex]

The standard deviation is:

[tex]\sigma_x = \sqrt{\frac{\sum(x - \bar x)^2}{n-1}}[/tex]

So, we have:

[tex]\sigma_x = \sqrt{\frac{(4 - 8)^2+ (14 - 8)^2+ (6 - 8)^2+ (2 - 8)^2+ (7 - 8)^2+ (12 - 8)^2+ (2 - 8)^2+ (17 - 8)^2}{8-1}}[/tex]

[tex]\sigma_x = \sqrt{\frac{226}{7}}[/tex]

[tex]\sigma_x = \sqrt{32.2857}[/tex]

[tex]\sigma_x = 5.68[/tex]

A logistics company's vulnerability scan identifies the following vulnerabilities on Internet-facing devices in
the DMZ: SQL injection on an infrequently used web server that provides files to vendors SSL/TLS not used for a website that contains promotional information
The scan also shows the following vulnerabilities on internal resources: Microsoft Office Remote Code Execution on test server for a human resources system
TLS downgrade vulnerability on a server in a development network In order of risk, which of the following should be patched FIRST?
A. Microsoft Office Remote Code Execution
B. SQL injection
C. SSL/TLS not used
D. TLS downgrade

Answers

Answer:

A. Microsoft Office Remote Code Execution

Explanation:

From the given options, we have;

The web server having a SQL injection is infrequently use

The information on the website having SSL/TLS not used is promotional

The location of the server having  a TLS downgrade is on a development network

The location of the Microsoft Office Remote Code Execution is on a human resource system test server

Therefore, given that the test server, is the deployment source of the main server, and that with a Remote Code Execution, RCE,  cyber attack, the attacker is able to make commands work on other computers, the RCE attack on the test server is a potential access of an attack on the main servers, and should be patched first.

full form of ip ........?​

Answers

internet protocol - hope this helps!

Write technical term of following statements: a.The set of programs to perform specific task. b.A feature of computer which tells multi-functioning capability of computer. c.The first calculating machine designed for the manipulation of census data. d.The first computer programmer.​

Answers

Answer:

a) Application software

d) Lady Augusta Ada Lovelace

b) (it may be versatility

Other Questions
HELP !!!! Please.. ASAP Can someone plz help me :< Which is the longest distance? A: 3500cm B: 65.5m C: 75000mm D: 15.5m E: 0.1km 150 cm7xcm24x cmThe right-angled triangle in the diagram has sides of length 7x cm, 24x cm and 150 cma Show that x= 36. . Choose the best answer A, B, C or D:1. Rarely ____ she made mistake since she was a manager.A. have B. has C. is D. are2. _____ I you, I wouldnt give him the money.A. If was B. If were C. Was D. Were3. So beautiful _____ that the Queen is envious with her.A. Snow White is B. Snow White are C. is Snow White D. are Snow White4. Never _____ in such a strange situation.A. has I been B. have I been C. am I been D. I have been5. Seldom _____ dinner together.A. do Mark and Juliet have B. does Mark and Juliet have C. is Mark and Juliet have D. are Mark and Juliet have please help me out :)))) According to Walter Christaller's central place theory, smaller cities are able to provide a more diverse array of services than larger cities. Please select the best answer from the choices provided. T F Write the additive inverse of each of the following rational numbers: FIRST CORRECT WILL BE MARKED BRAINLIEST!!!Which expression is the result of solving the equation ax-b=cy for x (For a[tex]\neq[/tex]0) To nest one structure within another structure, you a. define both structures and then create a data member of the nested structure type within the other structure b. create a container that holds objects of the nested structure type and then include the container within another structure c. define the nested structure within another structure Please help plssssssss What happens when people go out in the sun in summer to tan for several hours a day without using any sunscreen? Which of the following is a world organization that the executive branch works with while conducting foreign policy?A) FBIB) NASAC) United Nations D) United Way Factorise: x^3 + x^2 + x^2y + xy + yPlz also show me the process. HELPPPPP ASP PLZZZZZ URGENT!!!!The value of a12 is: 201 can't be done Which equation describes a physical change? i. H2O(s) H2O(l) ii. Na+(aq)+Cl(aq) +Ag+(aq)+NO3(aq) AgCl(s)+Na+(aq)+NO3(aq) iii. CH3OH(g)+O2(g) CO2(g)+H2O(g) iv. 2H2O(l) 2H2(g)+O2(g) v. H+(aq)+OH(aq) H2O(l) During a stay in the hospital, an accident victim develops symptoms of bacteremia. A blood sample shows the presence of Gram-positive cocci in pairs. Lab tests determine that the bacteria are non-hemolytic and bile salt tolerant. The bacteremia is likely due to QI the father13. A father and mother claim they have been given the wrong baby at the hospital. Both parents areblood type A. The baby they have been given is blood type o. Does the genetic evidence supporttheir claim? Im new to this app!And im looking for help!!Please help ASAP!!!Please!!!!