Computers and Technology, 23.03.2020 18:32 brittanyfox411
You are a network technician for a small corporate network. The company recently expanded to the second floor of its building. You've already installed a small networking closet on the second floor and run the necessary cables to the ports on each of the floor's fiber patch panels. You now need to connect the two networks using fiber optic cables.
Your task in this lab is to connect the switch in the Networking Closet on Floor 1 with the switch in Networking Closet 2 on Floor 2 through the fiber patch panels in each networking closet. Use the following information to help identify necessary connections:
Determine the appropriate fiber cable to connect the switches to the fiber patch panels.
For the patch panel on Floor 1:
Port 3 is transmit (Tx).
Port 4 is receive (Rx).
For the patch panel on Floor 2:
Port 1 is transmit (Tx).
Port 2 is receive (Rx).
Use the color coding on the end of fiber optic cables to identify which end is Tx and which is Rx.
Connector A (white or red) is Tx.
Connector B (black) is Rx.
Plug the switch on Floor 2 into a Bank 1 Critical Load outlet on the UPS.
Verify the connection has been made by checking for an Internet connection on any Floor 2 computer.
Answers: 1
Computers and Technology, 24.06.2019 16:00
How are roger williams, james oglethorpe, and william penn similar?
Answers: 3
Computers and Technology, 25.06.2019 01:30
Why is the most liked picture on instagram an eggy? owo
Answers: 1
Computers and Technology, 25.06.2019 08:00
Aresearcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use. direct identifiers will not be collected; however, ip addresses may be present in the data set. risk of harm should be evaluated by: solely by the magnitude or severity of expected harm. both the magnitude (or severity) and the probability (or likelihood) of harm. solely by the probability of expected harm. neither the magnitude or probability of harm.
Answers: 3
Computers and Technology, 25.06.2019 08:50
A-12.3 an american spy is deep undercover in the hostile country of phonemia. in order not to waste scarce resources, any time he wants to send a message back home, he removes all the punctuation from his message and converts all the letters to uppercase. so, for example, to send the message, “abort the plan! meet at the dark cabin.” he would transmit given such a string, s, of n uppercase letters, describe an efficient way of breaking it into a sequence of valid english words. you may assume that you have a function, valid(s), which can take a character string, s, and return true if and only if s is a valid english word. what is the running time of your algorithm, assuming each call to the function, valid, runs in o(1) time?
Answers: 3
You are a network technician for a small corporate network. The company recently expanded to the sec...
English, 30.10.2020 14:30
History, 30.10.2020 14:30
Mathematics, 30.10.2020 14:30
Mathematics, 30.10.2020 14:30
Mathematics, 30.10.2020 14:30
Computers and Technology, 30.10.2020 14:30
Computers and Technology, 30.10.2020 14:30
Mathematics, 30.10.2020 14:30
Mathematics, 30.10.2020 14:40
Social Studies, 30.10.2020 14:40
English, 30.10.2020 14:40
Mathematics, 30.10.2020 14:40
English, 30.10.2020 14:40
Social Studies, 30.10.2020 14:40