Mark this question for review To answer this question, complete the lab using information below. Launch Lab You are setting up on a small network. The owner of the network has decided to change his internet service provider (ISP) to EtherSpeed. The ISP has installed a connection to both RJ45 jacks on the wall plate. You are responsible for selecting the correct router to connect the network to the internet. You want to use the fastest connection speed available while maintaining security for the Home-PC and Home-PC2 computers. In this lab, your task is to complete the following: Use the appropriate network components to connect the two computers to the new ISP. • Place the Ethernet router with firewall capabilities on the Workspace. • Use the existing Cat5e Ethernet cables to connect the computers to the router's integrated Ethernet LAN ports. Use the AC to DC power adapter to plug in the device. • Use the Network and Sharing Center on both computers to confirm that the computers are properly connected to the network and internet. In this lab, the networking devices are preconfigured with the correct settings to make the connection to the internet service provider (ISP) and the internet.

Answers

Answer 1

The appropriate network components steps to take to connect the two computers to the new ISP is given below.

What is the network components  about?

In carryout the above task, the first thing to do is click the Shelf, and widen the Networking Devices.

Other steps are:

Take the Ethernet router and firewall to the Workspace.Beyond the router, Click on Back to switch and change to the back view.Beyond the switch, Click on Back to switch to change to back view of the switch.Beyond the cable modem, change by clicking on Back to switch to the back view as seen on the cable modem.

Later on click  on the Ethernet cable as found on the third switch port and then extend it to an open Ethernet LAN port on the router to link up the Home-PC down to the router.

Click also on the Ethernet cable as seen the third switch port and then take it also  to an open Ethernet LAN port as seen on the router to link up the second Home-PC to the router.

Then also click on the last Ethernet cable on the switch and extend (drag) it to the open Ethernet WAN port as seen on the router to link up the router to the internet service.

Then click the Ethernet cable on the cable modem and extend it to a single of the RJ45 ports that can be found by going to the wall plate.

Make sure to select the DC power connector that can be seen on the switch and extend it to the power port seen on the router so that one can plug in the router.

Looking at the Home-PC, select to view Windows 10 to see if the system is properly linked to the network and also the internet.

Go to the notification aspect and the select the Network icon and click on the tool called Open Network and Sharing Center.

Lastly, One can know if the connection to Home-PC2 is working by clicking on bench as seen in the top menu, and then select to see Windows 10 to know if it is well linked to the network and internet and also follow the notification steps above.

Learn more about  network components from

https://brainly.com/question/20535662

#SPJ4


Related Questions

Cloud Kicks wants a report Co categorize accounts into small, medium, and large based on the dollar value found In the Contract Value field. What feature should an administrator use to meet this request

Answers

The feature that the administrator can use to meet this request is known as Bucket Column.

What is a bucket column?

A bucket column is known to be formed when a person define a lot of categories (buckets) that are known to be used to group report values.

Therefore, The feature that the administrator can use to meet this request is known as Bucket Column. as one can report, sort, filter, and group via the use of bucket columns.

Learn more about accounts from

https://brainly.com/question/24756209

#SPJ1

Type the correct answer in the box spell all words correctly.
karl has designed an interactive stories website for kids. he has implemented an alphabetical format for browsing through the stories. which
structure will he use for easy navigation?
kart implements a
structure for users to advance through the chapters.
reset
nexus

Answers

Kart should implement a main navigation structure for users to advance through the chapters.

The types of navigation.

In Computer technology, there are three main types of navigation used on websites and these include the following:

Structural navigationUtility navigationAssociative navigation

In this scenario, Kart should implement a main navigation structure for users to advance through the chapters on this interactive stories website for kids.

Read more on website here: https://brainly.com/question/26324021

#SPJ1

software that requires a monthly subscription fee is called

Answers

Answer:

Software as a service

Explanation:

You may hear this as (SaaS) for short.

A record company is using blockchain to manage the ownership of their copyrighted content. the company requires that every time one of their songs is used for commercial purposes, all the parties involved in creating it receive a set percentage of a royalty fee. how can a blockchain help track the royalty fees?

Answers

Blockchain is the system that records the details across many systems for monetary purposes. It can help in tracking the royalty by using the method of consensus.

What is royalty?

Royalty is the amount of money that gets paid to the person who made the patent and allows the use of the patented or copyrighted item in exchange for some amount. It can be given for songs, books, etc.

The consensus method of royalty calculation is based on the percentage that includes some amount of net revenue that is produced when the patented item is used.

Therefore, the consensus method is used to calculate royalty.

Learn more about royalty here:

https://brainly.com/question/19537789

#SPJ1

HELP ASAP
Select the correct answer.
When designing an algorithm, what structure can be used to repeat some steps if a condition is met?
OA. iterations
OB. loops
OC. conditional
OD. flowcharts
OE. pseudocode

Answers

Answer:

B. loops

Explanation:

The while loop is used to iterate over a portion of code until a certain condition is fulfilled. Let's imagine we want to know how many times a number may be divided by two before it becomes less than or equal to one.

3.7 Code Practice
can someone write a code for me

Answers

Answer:

Explanation:

raaaaa faraon- yt:

love shady

Charlotte is using her teaching skills to train new employees on how to use software. the software is typically used in the engineering and technology pathway. which additional skill is she most likely using? mechanical knowledge persistence computer-aided design skills creativity

Answers

Answer:

Explanation:

c

list the parts of different engine.​

Answers

Answer:

here is the answer

Explanation:

The different parts that make up your car's engine consist of: the engine block (cylinder block), the combustion chamber, the cylinder head, pistons, the crankshaft, the camshaft, the timing chain, the valve train, valves, rocker arms, pushrods/lifters, fuel injectors, and spark plugs

The date you type at the beginning of a letter or report should be the date that the document is _____.

Answers

The date that is typed at the beginning of a letter or report should be the date that the document is:

Written

What is the Date of a Letter or Report?

Typically, the first date that is seen at the beginning of a report a document often connotes the date of writing.

For instance, if the letter or report was written today, it will bear today's date. This will help the recipient to have a clear understanding of the time frame.

Learn more about letter writing here:

https://brainly.com/question/1155995

#SPJ4

Which subnet would include the address 192.168.1.96 as a usable host address?

Answers

The subnet for the address 192.168.1.96 will be 192.168.1.64/26.

What is a subnet?

The subnet in the host address is given as the logical subdivision or the partition of the IT network. It enables the computer systems to share the same internet.

The subnet for the address 192.168.1.96 will be 192.168.1.64/26. It is based on the increment with the octet it falls in.

Learn more about subnet, here:

https://brainly.com/question/15055849

#SPJ1

A UNIX or Linux system might identify a file as: /usr/imfst/flynn/inventory.doc. The first entry is a forward slash ( / ) representing the master directory, called the ____ directory. a.root b.working c.main d.branch

Answers

Answer:

C

i cant give you an explaination on why it is like that but C sounds and seems the correct one

who am I ?

please say me the answers

Answers

Answer:

motherboard

Explanation:

because it serves as a platform to connect all the other parts of the computer. it is where CPU, harddrive, optical drives and other expansion are directly connected.

if a user watches a video with event tracking three times in a single session, analytics will count how many unique events?

Answers

Answer:

1

Explanation:

Analytics will count it a One (‘1’) Unique Event, even if a user watches a video with event tracking three times but in a single session.

which is the following career pathway for human services

Answers

The career pathway for human services includes:

Consumer servicesCounseling and mental health services, etc.

What are career pathways?

This is known to be the likely career choices that one can make based on a specific field.

Note that  the career pathways within the human services cluster are:

Consumer services.Counseling and mental health services.Early childhood development and services.Family and community services.Personal care services.

Learn more about  career pathway from

https://brainly.com/question/9719007

#SPJ1

Melissa is an amateur photographer and plans to post her best photos on a media-sharing network. She wants to include descriptions to identify the photos for viewers. What should she add to the photos

Answers

Melissa as  an amateur photographer should add Tags to the photos.

What is tag?

Tags is known to  be the ay that is said to be used in basic formatting tool employed in HTML (hypertext markup language) and others.

Due to the situation above, Melissa as  an amateur photographer should add Tags to the photos.

See options below

What should she add to the photos?

a. Metadata

b. Emojis

c. Tags

d. Reviews

Learn more about photographer  from

https://brainly.com/question/25821700

#SPJ1

A company has dedicated a subgroup of its development team to coding the exception handling aspects of an application. what is the significance of exception handling?

Answers

Exceptional handling is the program handling in unexpected circumstances. Exceptional handling is significant as the functions showing errors could be corrected.

What is exceptional handling?

In coding exceptional handling is the method to correct the errors in the function of the application program so that it does not get crash resulting in the loss of the task of the end-user.

It can be corrected by blocking, catching the handler, and by throwing expressions. The exceptions should be handled so that abnormal termination of the application is prevented.

Therefore, exceptional handling is significant to prevent program termination.

Learn more about exceptional handling here:

https://brainly.com/question/13261436

#SPJ1

Jake is a 6-year-old boy. his mother wants him to learn scissor skills for improving his finger grip. so, she hands him several colorful papers and a pair of scissors. jake does not have difficulty understanding which object cuts the other. what is this type of reasoning called?

a.
analogical
b.
deductive
c.
common sense
d.
inductive

please answer so brainly doesnt get rid of it.

Answers

According to this, I think it is common sense.

When sending a group email, how do you ensure that one or several recipients cannot see the names of other recipients?.

Answers

When sending a group email, to ensure that one or several recipients cannot see the names of the other recipient, add a Bcc box to your emails.

What is Bcc and cc field in an email?

Bcc and cc is a facility in sending an email to multiple people at one time. Bcc is added when sending multiple people, the same mail, but without knowing people the name of each other.

Cc is a field added when people can see the names of people who else got the mail.

Thus, to ensure that one or several recipients cannot see the names of the other recipient, add a Bcc box to your emails.

Learn more about Bcc and cc field

https://brainly.com/question/20525279

#SPJ1

Which organization provides a free, online html5 validator application to ensure that a webpage's html tags follow the rules for html5?

Answers

The organization provides a free, online html5 validator application to ensure that a webpage's html tags follow the rules for html5 is the W3C.

What does the W3C do?

The W3C's is known to help to create protocols and rules that makes sure that long-term  development of the Web.

Therefore, we can say that The organization provides a free, online html5 validator application to ensure that a webpage's html tags follow the rules for html5 is the W3C.

Learn more about The W3C  from

https://brainly.com/question/11179793

#SPJ1

1. Sunday Times wants an analysis of the demographic characteristics of its readers. The

Marketing department has collected reader survey records containing the age, gender, marital

status, and annual income of readers. Design an application (Flowchart) that accepts reader

data and, when data entry is complete, produces a count of readers by age groups as follows:

under 20, 20–29, 30–39, 40–49, and 50 and older. Hint: Refer to the program discussed in

class Figure 6-15




2. Create the logic (Flowchart) for a program that calculates and displays the amount of money

you would have if you invested R10000 at 4 percent simple interest for one year. Create a

separate method to do the calculation and return the result to be displayed.

The main program (Flowchart) should prompt the user for the amount of money and passes it

to the interest-calculating method. ​

Answers

Answer:

GIRL

Explanation:

DALAGANG FILIPINA

14 YEARS OLD

NEED FRIENDS

The logo for Ask search engine​
and pls no links

Answers

Answer:

Explanation:

hope it helps

a computer is made up of four different types of devices which are

Answers

A computer is made up of four different types of devices which are input, storage, processing and output devices.

What are computer devices?

Computer devices are those components of computer known as the computer hardware that ensures the proper functioning of the system.

The four different types of devices found in the computer are :

Input devices: These are used to put in data into the system.

Storage device:. These are used for storage of processed data.

Processing device: This is the brain box of the computer.

Output devices: They are used to display data.

Learn more about hardware here:

https://brainly.com/question/24370161

#SPJ1

A system engineer enhances the security of a network by adding firewalls to both the external network and the internal company network. The firewalls are products of two separate companies. This is an example of what type of security control practice?

Answers

Answer:

Vendor diversity

Explanation:

Different cybersecurity companies maintain different codebases, which means an exploit that might poke holes in the security of one likely won't breach the other. In this situation, the network would still have an active and effective firewall from one vendor even as the exploit from the other vendor's firewall is being patched.

What is the purpose of a cell (battery) in a circuit?

Answers

Answer:

The role of a battery (or cell) in an electric circuit is to supply energy to the circuit by doing work upon the charge to move it from the low energy terminal to the high energy terminal.

Explanation:

Zenith Computers is a software development company. It has received a random email claiming that there will be an attempt to hack and extract sensitive financial data of the company before the year end. The company has contacted you, a network analyst, to verify if such claims are indeed true. You have decided to set up a trap for the hackers by putting up a system containing false financial data. Which of the following will you use in this scenario?
A. Metasploit
B. Honeypot
C. Nessus
D. Nmap

Answers

Answer:

B. Honeypot

Explanation:

Honepots, like the name suggest, are sort of baits for the hackers. Honeypot pretty much decoys made to mimic the actual company computers. Hackers fall for it and think they hit jackpot. Once hackers try to extract info from the honeypot, the security analyst can either track the hackers to report to authorities or this is a way to distract hackers from the real protected data.

What is the need for computer programming?

Answers

Answer:

See Explanation

Explanation:

Programming languages use classes and functions that control commands. The reason that programming is so important is that it directs a computer to complete these commands over and over again, so people do not have to do the task repeatedly. Instead, the software can do it automatically and accurately.

Workplace ethics include playing games. looking up things on the internet that are not work related. taking care of personal business without permission during work time. doing the work you have agreed to do while at work.

Answers

Answer:

Doing the work you have agreed to do while at work

Explanation:

I'm not sure what exactly there is to explain. The other options are not things that should be done in the workplace

What is an example of using the internet of things (iot) to deliver innovative cloud-based solutions to customers?

Answers

Answer:

Wearable technology

Explanation:

An example of using the Internet of Things (IoT) to deliver innovative cloud-based solutions to customers is the wearable technology that provides customers with on-the-spot personalized experiences.

how to transfer crypto from coinbase to coinbase wallet

Answers

Answer:

Open Coinbase Wallet on your mobile device.

Tap to go to your Settings.

Tap Buy or Transfer.

Select the supported crypto.

Enter the amount you want to transfer then tap Continue.

Follow the remaining steps to complete your transfer.

The main function of a(n) ____________________ is to centralize access control for the network by keeping an eye on both inbound and outbound traffic and preventing unauthorized users and malicious code from entering a network. .

Answers

Maybe the answer is “server”
Other Questions
Please HelpThe larger can has a radius equivalent to the smaller can, but it is 1.5 times taller. How much larger is the area of the label for the 22 oz. can?1 The area of the label for the 22 oz. can is 1.5 times larger than the area of the label for the 15 oz. can. 2 The area of the label for the 22 oz. can is 2.25 times larger than the area of the label for the 15 oz. can3 The area of the label for the 22 oz. can is 3 times larger than the area of the label for the 15 oz. can.4 The area of the label for the 22 oz. can is 3.375 times larger than the area of the label for the 15 oz. can. ii. If the pressure after landing was 1.0 atm, what was the volume of the passenger's collapsed water bottle? (Assume the bottle collapsed easily and temperature didn't change.) (6 points) Which sentence best states two central ideas that support blancs argument Can someone explain how to do this plez I NEED HELP which of the following are major detiies in hinduism PLEASE HELP ME OUT PLEASEEEE Together, teammates Pedro and Ricky got 2682 base hits last season. Pedro had 280 more hits thanRicky. How many hits did each player have? 5. What is the difference between the meanings of the terms evolutionand natural selection? HOW IS IT NOT 16 SOMEONE HELP Two tickets to the movies cost $16. If two drinks add $4.56 to the total, how much change should be received from $25? requires temperatures of millions of degrees K Read the passage below and answer the question.An Oklahoma law prohibited the sale of "non-intoxicating" 3.2 percent beer to males at the age 21 and to females under the age of 18. Curtis Craig, a male then between the ages of 18 and 21, and Carolyn Whitener, a licensed vendor challenged the law as discriminatory.Based on the equal protection clause how the would the Supreme Court likely rule on this case? please solve this problem using the pythagorean theorem, and give me the right answer and I will give you brainliest. :) Write an argumentative essay discussing if it is better to volunteer with an environmental group in your local community, or a national environmental group. establish a claim, identify opposing claims, and cite evidence as well as examples to build your argument. Why was the donkey adopted as the symbol for the Democratic Party? What is the length of the line? covert the following 4kg to g If there were 20 gallons of water left in the fish tank after the waterleaked out, how many gallons of water does the fish tank hold whenit is full Find the volume of the rectangular prism.8 cm10 cm2 cm10 cmOA. 160.5 cmB. 182.4 cmOc. 181.4 cmD. 160 cm2 cm Martina has 372 grams of shells.Deandre has 45 grams of shells.How many grams of shells do they have altogether?