Users access servers located on a server VLAN and servers located in departmental VLANs. Users are located in the departmental VLAN. What is the expected traffic flow from users to servers

Answers

Answer 1

Answer:

Most of the traffic will have to be multilayer switched.

Explanation:

This is often referred to when a layer 3 switch is seen to add tons of flexibility to a network. As seen in in the above VLAN connection, it serves as a switch to connect devices found on same subnet a lightning speed and are seen also to posses IP routing intelligence which is seen as a doubling up built in it which serves as a router. It seen in most cases to support routing protocools, inspect incoming packages and most times checking sources and destination addresses which are been worked with.


Related Questions

This finding maximum number function will keep on going until we reach at the last value
[12, 18, 299, 38, 999, 89, 101, 500, 801, 45]

Answers

In which algorithm first the maximum element is found and then placed at the end?
Heapsort algorithm
The Heapsort algorithm involves preparing the list by first turning it into a max heap. The algorithm then repeatedly swaps the first value of the list with the last value, decreasing the range of values considered in the heap operation by one, and sifting the new first value into its position in the heap.

A desktop system on your network has been compromised. Despite loading different operating systems using different media on the same desktop, attackers appear to have access to that system every time it is powered up and placed on the network. This could be an example of what type of rootkit

Answers

Answer: Firmware rootkit

Explanation:

From the question, since despite loading different operating systems using different media on the same desktop, and the fact that attackers appear to have access to that system every time it is powered up and placed on the network. This could be an example of firmware rootkit

Firmware rootkits are a threat to ones online safety. In this scenario, the firmware of the computer are targeted by the rootkits and not the operating system and malware are then installed which can destroy the router, or hard drive. This can be used by hackers.

Draw the tree that results when you add the values 10, 20, 30, 40, 50, 60, 70, 80, 90, 100 to each of the following initially empty trees Binary search tree 2-3 tree 2-4 tree Red-black tree

Answers

Answer:

What exactly are you asking?

Explanation:

Please don't report me, I'll edit my answer once I know the question

We see that the  black height of a node is the number of black nodes on the path from the node to the root of the tree.

What is a Binary search tree?

The B\\binary search tree is described as rooted binary tree data structure with the key of each internal node being greater than all the keys in the respective node's left subtree and less than the ones in its right subtree.

A unique variety of self-balancing binary search tree is the red-black tree has the  following characteristics:

Any node's left subtree is shorter than the node itself.Any node's right subtree is bigger than the node itself.Each and every node has the same black height.

Binary search tree for 2-3 tree: is shown below:

   10

  /  \

 20   40

/  \  / \

30  50 60  70

Binary search tree for 2-4 tree is shown below:

   30

  /  \

 20   50

 / \   / \

10  40 60  70

/ \  / \  / \

80 90 100

Binary search tree for Red-black tree:

   20(R)

  /  \

 /    \

10(B)    30(R)

 /  \   /  \

40(B)  60(B)  70(B)

/ \  / \  / \

80(B) 90(B) 100(B)

Learn more about Binary search tree  at:

https://brainly.com/question/30391092

#SPJ2

Create a method named replaceCastMember that allows the name of a castMember at an index in the castMembers array to be changed. The method should take in 2 arguments, the int index and the String castMemberName. The method should return a true if the replacement was successful, false otherwise. (Note: Only update the castMember in the array if the index is valid)

Answers

Answer:

Explanation:

The following code is written in Java. It is a method that takes in the two parameters as requested and checks whether or not the index exists in the array. If it does then it replaces the String in that Index with the new castMemberName String parameter that was given. If the replacement is successful then it returns a True boolean, if not then it returns a False boolean. The array being used must be named castNames and have a global scope to be accessible by the method since it is not passed as a parameter.

public static boolean replaceCastMember(int index, String castMemberName) {

               System.out.println(castNames.size());

               if (index <= castNames.size()) {

                       castNames.remove(index);

                       castNames.add(index, castMemberName);

                       return true;

               } else {

                       return false;

               }

       }

Common uses of webinars include _____. Select all that apply.

A. corporate training

B. business meetings

C. distance learning

D. product demonstrations

Answers

Answer: distance learning

Explanation:

webinars are considered to be the best way that is currently used on a large scale to conduct online classes. it is referred to as the workshop, lecture, etc that conduct through the internet.  

it is defined as an interactive session that main aims to give, receive information in real-time. it consists of audio and video session between the listeners and speaker.

The common uses of the webinars incudes distance learning, corporate meetings, and product demonstration. Thus options B, C, and D are correct.

What is a webinar?

A webinar is an online event that is hosted by the organizations and companies and is broadcasted to the selected group of people by making the use of a computer and the internet.

These webinars can help in the launch of a product, can be useful for the distance learning purpose, and also help in business meetings.

Find out more information about the webinars.

brainly.com/question/20047596

What is the default zoom percentage in Word?

50%
100%
150%
200%

Answers

Answer:

The default zoom percentage in Word is 100%.

Answer:

100

Explanation:

Write a public member function removeRandom that removes a random element from the ArrayBag. This method should also return a boolean indicating whether an element was actually removed

Answers

Answer:

Explanation:

The following code is written in Java. It is a function that takes in the ArrayList called ArrayBag as a parameter and randomly removes one of the elements in the ArrayList. As long as the ArrayBag has at least 1 element it will return true otherwise it will return false.

public static boolean removeRandom(ArrayList ArrayBag) {

               Random rand = new Random();

               

               if (ArrayBag.size() > 0) {

                       int randomNumber = rand.nextInt(ArrayBag.size());

                       ArrayBag.remove(randomNumber);

                       return true;

               } else {

                       return false;

               }

       }

For two arrays A and B that are already in ascending order, write a program to mingle them into a new array ordered C evenly, the size of C is varied, depending on the values of A and B: the even-indexed (the index starts from 0) elements come from A while odd-indexed elements are from B. For instance, if A is (1,4, 10,12): B is 12.3,10, 11) then the new array C is (1, 2,4,10,12). If a black-box test approach will be used, how many test cases should you design?

Answers

Answer:

def generate_list(listA, listB):

   listC = []

   for item in listA[0::2]:

       listC.append(item)

   for items in listB[1::2]:

     listC.append(items)

   return sorted(listC)

Explanation:

The python program defines a function called generate_list that accepts two list arguments. The return list is the combined list values of both input lists with the even index value from the first list and the odd index value from the second list.

The logical way tables are linked is known as the database…

A. Schema
B. Primary Key

Answers

Answer:

B Primary Key

Explanation:

I think it is Primary Key but you can just make sure

What is your favorite game that you like to play ? ? ?

Answers

Answer:

Elder Scrolls online on xbox

Explanation:

Answer:

minecraft

Explanation:


4. In a relational database, entities are defined by
O A. values.
O B. columns.
O C. attributes.
O D. rows.

Answers

Answer:

C. attributes

Explanation:

A relational database is a database system that stores information within its servers. It has rows and columns that contain the data stored in them and which can be accessed at any time with the right administrative privileges.

In a relational database, entities are defined by their attributes. This is because an entity is the data that needs to be stored so, the attribute specifies that information and gives its value.

How would you create a 2D array of Strings called paintSwatches that holds the paint manufacturer, paint color name and the paint collection name (in that order) for each of the 60,000 paint swatches a store carries

Answers

Answer:

String[][] paintSwatches = new String[6000][3];

Explanation:

The two-dimensional array is a data structure that holds and locates data in rows and columns. It is denoted by two square brackets after the data type when declaring the array.

The two-dimensional array "paintSwatches" would have 6000 rows and one column each of paint manufacturer, paint color name and paint collection name (that is, 3 columns).

Write a C++ function, smallestIndex, that takes as parameters an int array and its size and returns the index of the first occurrence of the smallest element in the array. To test your function, write a main that prompts a user for a list of 15 integers and outputs the index and value of the first occurrence of the smallest value.

Answers

Answer:

Explanation:

The code in C++ is written as:

#include <iostream>

using namespace std;

int smallestIndex(int arr[],int size)

{

int min=arr[0],ind=0;

for(int i=0;i<size;i++)

{

if(min>arr[i])

{

min=arr[i];

ind=i;              NOTE: ind serves as a variable that is holding the smallest

}                                   element index of array

 

}

return ind;

}

int main() {

int arr[15];

cout<<"Enter 15 integers: ";

for(int i=0;i<15;i++)

cin>>arr[i];

for(int i=0;i<15;i++)

cout<<arr[i]<<" "<<endl;

int index=smallestIndex(arr,15);

cout<<"The position of the first occurrence of the smallest element in list is: "<<index<<endl;

cout<<"The smallest element in list is: "<<arr[index];

}

OUTPUT:

Enter 15 integers:

4

5

8

4

6

1

2

1

4

5

7

9

5

7

8

4   5  8  4  6  1  2  1  4  5  7  9  5  7  8  

The position of the first occurrence for the smallest element in the list is 5

The smallest element in the list is: 1

Write a function called no_you_pick. no_you_pick should have two parameters. The first parameter is a dictionary where the keys are restaurant names and the values are lists of attributes of those restaurants as strings, such as "vegetarian", "vegan", and "gluten-free".
#
#The second parameter is a list of strings representing of necessary attributes of the restaurant you select.
#
#Return a list of restaurants from the dictionary who each contain all the diet restrictions listed in the list, sorted alphabetically. If there are no restaurants that meet all the restrictions, return the string
#"Sorry, no restaurants meet your restrictions". Types of diet restrictions that exist in this question's universe are: vegetarian, vegan, kosher, gluten-free, dairy-free
#
#For example:
#grading_scale = {"blossom": ["vegetarian", "vegan", "kosher", "gluten-free", "dairy-free"], \
# "jacob's pickles": ["vegetarian", "gluten-free"], \
# "sweetgreen": ["vegetarian", "vegan", "gluten-free", "kosher"]}
#guests_diet = ["dairy-free"]
#no_you_pick(grading_scale, guests_diet) -> ["blossom"]


#Write your code here!
def no_you_pick(restaurants, preferred_diet):
result = []
for i in preferred_diet:
for key, value in restaurants.items():
# print(value)
if i in value:
result.append(key)
result.sort()
return result
return "Sorry, no restaurants meet your restrictions"

#Below are some lines of code that will test your function.
#You can change the value of the variable(s) to test your
#function with different inputs.
#
#If your function works correctly, this will originally
#print: blossom
grading_scale = {"blossom": ["vegetarian", "vegan", "kosher", "gluten-free", "dairy-free"], \
"jacob's pickles": ["vegetarian", "gluten-free"], \
"sweetgreen": ["vegetarian", "vegan", "gluten-free", "kosher"]}
guests_diet = ["dairy-free"]
print(no_you_pick(grading_scale, guests_diet))
**My code doesn't seem to work, any help with it I'll really appreciate it!**

Answers

Answer:

...

Explanation:

What features do web development tools provide?

Web development tools come with several features to ease the process of building websites. Templates allow you to
experiment with a ___
Plug-ins allow you to___

Answers

The correct answer for the first choice is “variety of looks” and the other answer is “add features such as a payment system or spam blocker”
Explanation: platolivesmattertooyk?

Please need help ASAP will mark brainliest

Answers

Answer:

x8 negakation with a false

apply the fade transition with smoothly effect to all slides in the presentation​

Answers

Answer:

12

Explanation:

its very long answer so that it is that

Anyone know how to do this?

Answers

Answer:

bro it is simple click on text and click between the lines and u can write easily.

hope u mark me brainliest thank u ♡♡♡

yea you basically fill it in with the information that will be provided on another page

hope this helps : )

brainliest plz

Please NEED HELP ASAP WILL MARK BRAINLIEST ONLY #8

Answers

Answer:

I think its A

Explanation:

Write a class called Dragon. A Dragon should have a name, a level, and a boolean variable, canBreatheFire, indicating whether or not the dragon can breathe fire. The class should have getter methods for all of these variables- getName, getLevel, and isFireBreather, respectively. Dragon will alsomeed a constructor, a method to gain experience, and a method to attack. The constructor should take the name as the first argument and the level as the second argument. The constructor should initialize canBreatheFire based on the dragon's level. If the dragon is level 70 or higher, the dragon can breathe fire (meaning the third member variable should be set to true). You should create three getter (accessor) methods called getNameO getLevelO,and isFireBreatherO You should also create a method called attackO. This method does not return anything. If the dragon can breathe fire, it should print >>>999 1 public class Dragon private String name; private int level; private boolean canBreatheFire; 4 7 // Write the constructor here! public String getName(name) 9 10 return name; 12 13 14 - 15 public int getLevel(level) return level; 16 17 /Put getters here 18 19 20 21 221/ String representation of the object 23 24 - 25 26 27 3 28 // Put other methods here public String toStringO return "Dragon+ name +" is at level "+ level; 1 public class DragonTester extends ConsoleProgram 2 4 6 public void runCO // Start here! 7

Answers

Answer:

public class Dragon {

private String name;

private int level;

private boolean canBreatheFire;

public Dragon(String name,int level){

this.name=name;

this.level=level;

if(level>=70) {

this.canBreatheFire=true;

}

}

public String getName() {

return name;

}

public int getLevel() {

return level;

}

public boolean getCanBreatheFire() {

return canBreatheFire;

}

public void attack() {

if(getCanBreatheFire()) {

System.out.println(">>> 999");

}else {

System.out.println("Dragon does not have fire breath.");

}

}

public void gainExperience() {

level += 5;

}

public String toString() {

return "Dragon "+ name + " is at level "+ level;

}

Explanation:

The Java program above is a class called Dragon. An object instance of the dragon class has a name and level class variable. The level is used to determine the Boolean value of the canBreathFire class variable. The variables can be retrieved with the getter methods and the level updates by the experience method.

Create a SELECT statement that returns the count, average, max and min of the invoices submitted by each vendor, who has submitted more than one invoice. Order by the number of invoices in descending order. Should return 12 rows.

Answers

Answer:

SELECT Count(order_invoice) as number_of_invoices, Max(order_invoice) as maximum_invoice, Min(order_invoice) as minimum_invoice, Avg(order_invoice) as average_invoice

FROM vendor JOIN invoice ON invoice.id = vendor.id

WHERE order_invoice > 1

ORDER BY number_of_invoices DESC

Explanation:

The select statement of the SQL or structured query language returns twelve rows of four columns from the inner join of the vendor and invoice table in a database where the order_invoice column in the invoice table is greater than one. The result of the query is ordered by the alias column "number_of_invoices" in descending order.

the processes of only seeing only some records frome data table is called as what​

Answers

Explanation:

For other uses, see Table. An example table rendered in a web browser using HTML. A table is an arrangement of data in rows and columns, or possibly in a more ... The first row is not . is called Html

You're typing up a document and come across the word sentient. You don't believe the readers of the document will know the meaning of the word, and you would like to substitute another word that's more common. What Word feature would you use to assist you in selecting a different word?

Answers

You would use a software tool that looks up the synonyms such as The Thesaurus

You would use a software tool that looks up the synonyms such as The Thesaurus.

What are the application?

Applications are type of software that are installed in a specific operating system of a computer that deviates from those system software installed together with the system itself. These third-party applications are necessary for other functions such as entertainment, business, leisure and other needs addressing of which the system software can't provide.

A networking software can be defined as a set of executable instructions (codes) that is typically designed and developed to instruct a networking device on how to perform a specific task or transmit data from one location to another.

System software has software that has been intended to serve as the foundation for other software. The Operating systems like the macOS, Linux, Android, and the Microsoft Windows are the examples of the system software, as are computational science software, game engines, search engines, industrial automation, and software as a service applications.

Therefore, You would use a software tool that looks up the synonyms such as The Thesaurus.

Learn more about software on:

https://brainly.com/question/892475

#SPJ3

What are the correct steps to add the bill using the receipt capture feature in quick books online?

Answers

Answer:

How it Works

The Bill can be imported into QuickBooks in a verity of methods such as drag and drop, browse to upload, email and image upload from a mobile device. The imported data is processed by QuickBooks. In my testing this processing varied depending on the type of document sent but overall, the process was fast, and the Bill was ready to view and categorized within five minutes. There were several pieces of data already extracted from the document which were the data and dollar amount but all other details in my experience needed to be entered.

One thing to not is you can not expense by line items at this time. Instead you can only choose one expenses account per transaction. (if I were a betting girl, I would say this is in the works, but I have no official word on that) However, you can add Classes and Billable Customers.

How to Get Started:

1) From the QBO Navigation Bar choose Banking Center

2) Select the Receipts tab

3) Drag and drop, email or upload a mobile image of the document to QuickBooks (1 file at a time)

4) From the For Review section of the Receipts tab you can see when the document is ready for review

5) QuickBooks extracts, data including date and dollar amount

6) Click on Review in the Action column

7) Select Bill as Document Type (as shown highlighted in the 'red box')

8) Enter the remaining details:

- Enter Payee

- Approve Bill date and enter due date

- Select Account  

- Verify amount total

- Additional Fields (optional)

- Make expenses billable

- Select Customer

- Class

- Add reference number

9) Import into QuickBooks by Saving and Closing

Within, seconds your document is coded and published into QuickBooks as an Open Bill pending payment. Like I said for now all you can add is an account but if you published the document to QBO you could later open it and edit to add required items if necessary.

The last step in optimization is after you have posted the payment to the open bill you will be able to match the bank feeds in QBO if you have already imported your banking activity. This type of audit proofing your bookkeeping helps prevent fraud and assures accuracy.

Hope this helps!! Merry Christmas!! And Happy New Year!!

In the program below, numA is a
def multiply(numA, numB):
product = numA* numB
return product
answer = multiply(8,2)
print (answer)

parameter

qualifier

accumulator

return value

Answers

Answer:

parameter

Explanation:

In the function 'multiply' you can pass values in that are to be used inside the function. These are called 'parameters' and are in parentheses after the function name.

- A qualifier is a name that adds extra information, such as 'final' to prevent reassignment

- An accumulator is a variable you use to sum up a bunch of values

- A return value is a mechanism to pass the result of a function back to the calling program (into 'answer' in above example).

Users report that the network is down. As a help desk technician, you investigate and determine that a specific router is configured so that a routing loop exists. What should you do next

Answers

Answer:

Determine if escalation is needed.

Explanation:

Since in this case, it has been determined that a specific router is configured in a way that a routing loop exists, the technician would further need to determine if the following issues are persistent;

having a switching loop on the networkgeneral router problemsrouting loopif there are broadcast storms.

Describe the user interface in other high-technology devices commonly found in the home or office, such as a smartphone, HD television, fitness watch, or microwave oven. Pick one specific device and discuss how well its interface is designed and how easy it is to use. Does the device use the same techniques as computer system interfaces, such as menus and icons

Answers

Answer:

Explanation:

Different technologies use different user interface designs in order to make the user experience as easy and intuitive as possible. This varies drastically from one device to another because of the capabilities and size of each device. If we take a fitness/smart watch into consideration, this device does not use pop up menus or side scrolling menus but instead uses large full screen menus where each option nearly fills the entire screen. That is done because the smart watch screens are very small and making everything full screen makes reading and swiping through options that much easier for the user. If the user interface were the same as in a television or smartphone it would be impossible to navigate through the different options on such a tiny screen.

the best presentations try to include as much text as possible on each slide true or false ​

Answers

true is answered of that question

What are some of the ways we can resolve IPv4 address shortages? Check all that apply.

Answers

Answer:

I am not as close to the network as I used to be but I have not seen articles about the network apocalypse due to IPv4 address depletion. Unlike in the late 90’s when predictions of apocalypse were everywhere.

What happened?

Two things:

Network address translation (NAT) was introduced to allow organizations to use private addresses on their internal network and minimize the requirement for “real” IP4 addresses.

Second, IPv6 was created and introduced to expand the number of addresses available.

So, a direct answer is use IPv6 and/or NAT for internal networks.

Explanation:

why media is far from government​

Answers

Answer:

An independent media means that no one should control and influence its coverage of news. Media is far from independent, this is because of control of government over them. Government prevents some news items, scenes from a movie, or lyrics of songs from being shared with larger public, this is called as censorship.

hope it helps

pls mark as brainliest.....

An independent media means that no one should control and influence its coverage of news. Media is far from independent, this is because of control of government over them. Government prevents some news items, scenes from a movie, or lyrics of songs from being shared with larger public, this is called as censorship.
Other Questions
There are between 24 and 40 students in a class.The ratio of boys to girls is 4:7How many students are in the class? How do you convert a rational exponent into a radical? Use proper terminology (numerator, denominator, index, radicand, power). frugality can help prevent some social problems explain Expand these expressions.(x 7) what page of night is the quote There's a long road of suffering ahead of you. But don't lose courage. You've already escaped the gravest danger: selection. So now, muster your strength, and don't lose heart. We shall all see the day of liberation. Have faith in life. Above all else, have faith. Drive out despair, and you will keep death away from yourselves. Hell is not for eternity. And now, a prayer - or rather, a piece of advice: let there be comradeship among you. We are all brothers, and we are all suffering the same fate. The same smoke floats over all our heads. Help one another. It is the only way to survive This finding maximum number function will keep on going until we reach at the last value[12, 18, 299, 38, 999, 89, 101, 500, 801, 45] A template of a Venn diagram representing common and differentiating characteristics of covalent and ionic bonds is shown.Which of the following characteristics can be written only in space B?a)Occurs in substances that have at least one non-metalb) Occurs in substances that have a repeating lattice structurec) Occurs in substances that have discrete molecular structured) Occurs in substances that have high melting points Fill in each blank with an appropriate word:1.The price of gold has not comethis year.2.She has her property to fall backin her old age.3. Kindly desist... causing damage to my garden.4.He has takenpainting as a hobby.5. The factory turns5,000 bags of sugar per day.6.I have disposedthe old books.7. The King was blindone eye.8.Music is a passionhim.swers Out triangle-shaped pennants on the first day of school. If each pennant has a base of 5 inches and a height of 12 inches, what is the area of each pennant in square inches? A runaway train car that has a mass of 15,000 kg travels at a speed of 5.4 m/s down a track. Compute the time required for a force of 1500 N to bring the car to rest. write the number with the least value using the digits 1 through 9. use each digit only once. explain your reasoning Please help! This is due in 10 minutes! Question 5 (2 points)The graph shows the distance a car traveled, y, in x hours:What is the rise-over-run value for the relationship represented in the graph? 1) 1/352)2/173) 354) 40 find the slope of the line y = -2x + 3 HELP PLEASE! Why should journalists avoid using too many big words?A. Readers cannot understand big words.B. They can make an article seem heavy.C. They run the risk of misusing the big words.D. Readers have a hard time finding the facts. Which historical events prior to the expansion of sea travel contributed to the Growth of interconnection across oceans during the period from 1450-1700s in act lll, who become suspicious of macbeth from the king murder of king Duncan In the first quadrant, you start at (7,4)and move 4 units leftWhat point will you end on? Farmer and Taylor formed a partnership with capital contributions of $285,000 and $335,000, respectively. Their partnership agreement calls for Farmer to receive a $87,000 per year salary. The remaining income or loss is to be divided equally. Assuming net income for the current year is $237,000, the journal entry to allocate net income is: Base your answer to the following question on the passage below and on your knowledge ofsocial studies."... We hold these truths to be self-evident, that all men are created equal, that they are endowedby their Creator with certain unalienable Rights, that among these are Life, Liberty and thepursuit of Happiness.deriving their just powers from the consent of the governed, -- That whenever any Form ofGovernment becomes destructive of these ends it is the Right of the People to alter or abolish it,and to institute new Government."That to secure these rights, Governments are instituted among Men,-Thomas Jefferson, Declaration of Independence, 1776What was the purpose of this statement?O Provide reasoning for declaring independence from EnglandO Encourage obedience to Great BritainO Urge support for the Albany Plan of the UnionO Criticize the Articles of Confederation