A) What is the initial configuration BPDU for B4? B) What is the configuration BPDU of B3 after receiving the initial configuration BPDU of B5? C) If B3 accepted B2 as the root, what is the configuration BPDU of B3? D) If B2 accepted B1 as the root through B7, what is the configuration BPDU of B2? E) Which bridge is the designated bridge of LAN C at this time? F) Now, if B5 accepted B1 as the root, what is the configuration BPDU of B3 after receiving the new configuration BPDU of B5? G) Which bridge is the designated bridge of LAN C at this time?

Answers

Answer 1

Answer: b is good

Explanation:


Related Questions

Which part of the packet contains the sequencing information that's used by TCP to reassemble packets

Answers

Answer:

During the TCP startup and teardown sequence, a "phantom byte" causes the sequence number and acknowledgment number fields to increment by 1 even though no data is exchanged. This phantom byte can be confusing when you have just learned that the sequence number field increments only when data is sent.

Explanation:

The CTRL, ALT, and WINDOWS keys are commonly used for keyboard shortcuts, which are keystrokes that can quickly perform an operation within software. True False

Answers

answer
True
explain



The shortcut keyboard is one or more keys that are used to performing a program and other capabilities, that's why the given statement is "True", and the further discussion can be defined as follows:

The keyboard shortcut is a set of one or more keys that invoke the preprogrammed activity of the software package.Shortcut keys are the strategic utilization key combinations on one's keyboard for more good functioning in your software. The shortcuts are in one's file folders, word processing programs, and even for e-mail accounts or social bookmarking sites.The keyboard shortcuts, CTRL, ALT, and WINDOWS, which can perform quickly in the software, are commonly used.

Therefore, the final answer is "True".

Learn more:

brainly.com/question/1212286

What framework is used for transporting authentication protocols instead of the authentication protocol itself

Answers

Answer:

EAP (Extensible Authentication Protocol)

For transporting authentication protocols instead of the authentication protocol itself will be an Extensible Authentication Protocol.

What is the Extensible Authentication Protocol (EAP)?

An architecture for authentication that is often used in network and internet connections is called Extensible Authentication Protocol (EAP). RFC 5247 updates RFC 3748's definition, which superseded RFC 2284's. EAP is a framework for authentication that enables the delivery and use of data and parameters produced by EAP techniques.

RFCs describe a large variety of tricks, and there are also several merchant methods and fresh proposals. EAP merely specifies the information from the interface and the formats; it is not a wire protocol. Each EAP-using protocol specifies a method for encasing user-generated EAP messages inside this messages of that connection.

For shipping confirmation conventions rather than the verification convention itself will be an Extensible Authentication Protocol.

More about the Extensible Authentication Protocol link is given below.

https://brainly.com/question/20813972

#SPJ12

What is an html skeleton? If you know what it is can you write it for me?

Answers

Answer:

HTML Skeleton. The basic HTML skeleton is the set of tags required of every HTML web page you build. The tags that make up the skeleton tell browsers what kind of file it is reading, and without the skeleton HTML files will not be rendered correctly in web browsers. There are four tags that need to be included in the skeleton.

Explanation:

Write a basic notation for

[tex]a = \frac{(b + d)}{2c} [/tex]
[tex]z = \frac{x}{y + c} [/tex]
[tex] c = \frac{9c + 32}{5} [/tex]





Answers

Answer:

[tex]a = (b + c)/(2 * c)[/tex]

[tex]z = x/(y + c)[/tex]

[tex]c = (9 * c + 32)/5[/tex]

Explanation:

Required

The expression in basic

To do this, we use () to group items, / as divide and * to combine factors

So, we have:

[tex](a)\ a = \frac{(b + d)}{2c}[/tex]

In basic, it is:

[tex]a = (b + c)/(2 * c)[/tex]

[tex](b)\ z = \frac{x}{y + c}[/tex]

In basic, it is:

[tex]z = x/(y + c)[/tex]

[tex](c)\ c = \frac{9c + 32}{5}[/tex]

[tex]c = (9 * c + 32)/5[/tex]

A _____ can be used to create and test prototypes, develop interfaces, and simulate factory layouts and assembly lines, without investing in physical equipment and layouts.

Answers

Answer:

The correct answer is "Cave automatic virtual environment ".

Explanation:

An interactive virtual setting composed of something like a VR chamber or space throughout the cube form wherein the projection displays represent the boundaries as well as flooring, is determined as Cave automatic virtual environment.This same client computer does have a Virtual reality headset as well as header projection but instead uses devices like walls etc.

 

What are the three ways you can add recipients to your marketing emails? Add a list of contacts, add individual contacts, or save the email as a sales email. Add a list of contacts, add individual contacts, or save the email as a services email. Add a list of contacts, add individual contacts, or save the email for automation. Add individual contacts, save the email for auto

Answers

Answer:

Explanation:

The three ways of doing this are to add a list of contacts, add individual contacts, or save the email for automation. The list of contacts would be added as a single file containing a large collection of contacts which would all be imported. Adding individual contacts would be done one by one would need to be done manually. Lastly, we have saving the email for automation which would automatically add the email and the contact info asociated with that email to your marketing emails.

Answer:

add a list of contacts, add individual contacts, or save the email for automation

Explanation:

IN C++ PLEASE!!!! Define a function FilterStr() that takes a string parameter and returns "Good" if the character at index 4 in the string parameter is uppercase. Otherwise, the function returns "Bad".

Ex: FilterStr("sandwich") returns

Bad

Recall isupper() checks if the character passed is uppercase. Ex: isupper('A') returns a non-zero value. isupper('a') returns 0.

string's at() returns a character at the specified position in the string. Ex: myString.at(3)
)
#include
#include
#include
using namespace std;

/* Your code goes here */

int main() {
string input;
string output;

getline(cin, input);
output = FilterStr(input);
cout << output << endl;

return 0;
}

Answers

Answer:

Replace /*Your code goes here */ with

string FilterStr(string str){

   string retStr= "BAD";

   if(isupper(str.at(4)) != 0){

     retStr = "GOOD";

   }

   return retStr;

}

Explanation:

This defines the function

string FilterStr(string str){

This initializes the return string to BAD

   string retStr= "BAD";

This checks if the string at index 4 is uppercase;

   if(isupper(str.at(4)) != 0){

If yes the return string is updated to GOOD

     retStr = "GOOD";

   }

This returns the return string

   return retStr;

}

See attachment for complete program

1.printer is an example of......... device.

Answers

Printer is an example of output devise.It gives hard copy output on paper .

1. Printer is an example of output device.

I hope it's help you...

application software can run without the presence of system software true or false ​

Answers

Answer:

false

...........

.....

to which category of software does Microsoft Works belong
a) custom-written
b) customized
c) integrated
d) special purpose ​

Answers

Answer:

c) Integrated

Explanation:

Integrated software are packages that has the functional capacity to perform the several tasks commonly performed by more than one productivity software application, such that those functions and capabilities are integrated into a single application, thereby making it possible for users to carry out required computer tasks, at a lower cost

Examples of integrated software include Microsoft Works, which includes a Word processing, spreadsheet, and database capabilities combined into one application

If you want to work on all aspects of your presentation, switch to __________ view, which displays the Slide pane, Outline pane, and Notes pane.

Answers

Answer:

Normal

Explanation:

If you want to work on all aspects of your presentation, switch to normal view, which displays the Slide pane, Outline pane, and Notes pane.

What is presentation?

Productivity software includes Docs, Excel, and Presentation software. Word processing programs, spreadsheets, presentation software, and graphic design programs are examples of productivity software.

Norton Antivirus is a type of antivirus and security software for PCs and laptops that is one of the options provided. Instant Messenger is a type of communication software that allows two or more people to communicate via text over the Internet or other types of networks.

It enables efficient and effective communication by allowing for the immediate receipt of a response or acknowledgement.

Therefore, switch to normal view to work on all aspects of your presentation, which displays the Slide pane, Outline pane, and Notes pane.

To learn more about the presentation, refer to the below link:

https://brainly.com/question/17087249

#SPJ2

open accomplishing your task I was able to​

Answers

Answer:

WTH KINDA QUESTION IS THIS !

I DON'T UNDERSTAND DUDE

__________ is a term used to indicate any unwanted event that takes place outside normal daily security operations. This type of event relates to a breakdown in controls as identified by the security policies.

Answers

The answer is “a security event”

__________ benchmark and monitor the status of key system files and detect when an intruder creates, modifies, or deletes monitored files.

Answers

Answer:

HIDPSs

Explanation:

The Host based Intrusion Detection and Prevention System abbreviated as HIDPS is a software system designed to monitor and protect the system against danger. The HIDPS system is able to carry out it's protective function as it monitors log files of system and other key system files. This enables it to monitor activities on the local host computer. Therefore, once an intruder performs any action such as creation, modifying or deletion of a file, the HIDPS system notices it in the audit logs which are being monitored and recorded.

What is the usage of "yield" in python?

Answers

Answer:

Yield is a keyword in Python that is used to return from a function without destroying the states of its local variable and when the function is called, the execution starts from the last yield statement. Any function that contains a yield keyword is termed a generator. Hence, yield is what makes a generator.

Explanation:

You should avoid having other people in portraits with children. True False

Answers

Answer:

You should avoid having other people in portraits with children.

✓ False

Explanation:

The purpose of a function that does not return a value is Group of answer choices to insert a temporary implementation of a function that can be refined later only used when the function needs to produce output to package a repeated task as a function even though the task does not yield a value to provide a function that can only be included in an assignment statement

Answers

Answer:

to package a repeated task as a function even though the task does not yield a value.

Explanation:

In Computer programming, a function can be defined as a group of organized, reusable sets of code that is used to perform a specific task i.e a single but related action. Thus, a function accepts data as an input, process the data and return a single result or a set of results.

Some of the notable characteristics of a function includes;

I. The name and arguments of the function must be specified by a function.

II. The implementation of a function is usually designed to be hidden from the caller.

IIII. A function define specific tasks that reusable at many points in a program.

A function that does not return a value after it executes is generally referred to as a void function. Thus, a void function uses the keyword "void" and has no explicit return statement in its body, with respect to a data type.

The purpose of a void function is to control returns back to the caller or package a repeated task as a function but, it doesn't yield a value.

While these two approaches have similarities in terms of the topics they address, __________ covers broad IT management topics and specifies which security controls and management need to be in place, while __________ goes into more detail on how to implement controls but is less specific about the broader IT management over the controls.

Answers

Answer:

COBIT, ISO

Explanation:

COBIT(control objectives and international and related information technology) is a framework created by ITGA(information technology governance institute) and ISACA. This framework is a guide for IT professionals and business executives in creating and managing IT controls and objectives. It aims to provide uniformity for purpose of aiding easy communication and IT auditing across organizations. It is broadly for IT management goals and processes.

While ISO( international standards organization) is a Non governmental organization that provides standards for specific IT products and systems and not specifically concerned about the general IT management procesd

how can i get better at typing because i suck

Answers

Answer:

Keep typing until you get used to it ●___●

I tried this technique
I look at the keyboard to type a random word like multiple times and then I would try it without looking. If I did it I go on
Hope this helped *smiles*

People think that they can send email messages from their personal computers and that it cannot be traced. This is called the _____.

Answers

Message Trace

Essentially it's a method used by administrators to monitor and trace emails

The core difference between phishing and spear-phishing is: a. spear-phishing has more specific targets than phishing b. phishing attacks via email, spear-phishing attacks via infected webpages c. phishing attacks via email, spear-phishing attacks via social media d. phishing is an outside attack; spear-phishing is an internal security check e. anti-virus software prevents phishing but not spear-phishing

Answers

Answer:

a. spear-phishing has more specific targets than phishing

Explanation:

The difference between phishing and spear-phishing basically lies in the target. Phishing is a form of malicious software sent to a large number of people, probably through their e-mails, with the hope that a small percentage will fall victim to the attack.

Spear-phishing, on the other hand, is targeted at just one person. The person and his itinerary are studied and a message is designed to apply to that person and elicit his interest. Clicking on the message or link exposes the person's device to attack and unauthorized information might be obtained or malware is installed.

write a program to generate following series in qbasics 100,81,64,....1​

Answers

Answer:

[tex]9 \times 9 = 81 \\ 8 \times 8 = 64 \\ 7 \times 7 = 49 \\ 6 \times 6 = 36 [/tex]

it's square root number you multiple times by 2

An EULA usually takes the form of an electronic notification that appears when installing software. The user then has a choice to accept or decline the terms of this agreement. True False

Answers

Answer:

True

Explanation:

An end user license agreement (EULA) is usually designed by a software developer to take the form of an electronic notification that would appear on the screen of the device of an end user when he or she is installing a software.

Furthermore, an end user has a choice to accept or decline the terms of this agreement.

I m a rectangle in a flow chart? What do I represent?

Answers

Answer:

It represents processing box

does unturned game is good for low end PC that without graphics card?​

Answers

Answer:

What are your current PC specs and what operating system are you using?

Explanation:

Below are the minimum/recommended system requirements for Windows:

Minimum requirements:

OS: Windows 7 SP1+

Processor: 2 GHz

Memory: 4 GB RAM

DirectX: Version 10

Storage: 4 GB available space

Recommended Requirements:

OS: Windows 10 64-bit

Processor: 3 GHz

Memory: 8 GB RAM

DirectX: Version 11

Network: Broadband Internet connection

Storage: 6 GB available space

To  check your specs (Windows):

1. Right-click on the Windows start menu icon on the bottom left-hand side of your screen.

2. Click on ‘System’ in the menu that pops up.

3. Next to ‘Device/Windows Specifications’ it will list all the information

What is the reporting library? A resource that offers dozens of canned reports built around marketing best practices A reporting add-on feature you can buy for an additional $300 a month Dozens of canned reports that help you dig a little deeper into your data — only currently available to HubSpot Admins The section of your public library where HubSpot developers sit when creating the HubSpot reporting tools

Answers

Answer:

A resource that offers dozens of canned reports built around marketing best practices

Explanation:

Report library is a resource within HubSpot that stores reports in standard formats which a user can save to her or his list of reports and which can also be added to the users dashboards.

The topics handled by each report are based on best practices, including sales metrics, and the performance of websites, and there are dozens of reports within the library to choose from

Therefore, the reporting library is a resource that offers dozens of canned reports built around marketing best practices

A level 3 security system focuses on protecting the _____ against intrusion, denial-of-service attacks, and unauthorized access.

Answers

Answer:

corporate network

Explanation:

A level 3 security system focuses on protecting the corporate network against intrusion, denial-of-service attacks, and unauthorized access.

There are two major types of wireless networks that are popular today among users. These networks are Wi-Fi and ____

Answers

Answer:

That would be Bluetooth

Explanation:

As Bluetooth is the most widely used network. It is used to operate many things, such as:

Headphones

Speakers

Remotes

etc.

In data representation, what represents one character which may be a
letter, number, or punctuation mark.

Answers

Answer:

Binary ?

Explanation:

Im not 100% sure but it could be binary or 0

Other Questions
What makes up the mantle whether the distribution of the mean of a large number of independent, identically distributed variables. true or false Help please! When gas prices go up, demand goes down slightly, but supply goes up dramatically. Using all ofyour critical thinking skills, develop a theory as to why this might be. Absolute zero temperature is not the zero energy temperature.explain If a planet has the same mass as the earth, but has twice the radius, how does the surface gravity, g, compare to g on the surface of the earth Why did the government break its treaty with the Nez Perce?A Gold was discovered on their land.B. The Nez Perce were attacking settlers.C. Chief Joseph the Younger was considered a dangerous leaderO D The Nez Perce wanted to move to Canada A researcher conducts a repeated-measures design study comparing 2 treatment conditions and obtains 20 scores in EACH treatment condition. How many participants participated in the study Directions: Solve for the missing proportion in each of the following problems. 9. 12/n = 20/25 10. 5/8 = n/24 11. 2/3 = 16/n 12. 12/14 = n/21 13. n/10 = 6/15 14. 12/3 = 10/n 15. 5/n = 10/16 16. 12/8 = 4/n What's 70 x4 I just wanna see if its really going to help me A plane is flying a circular path at a speed of 55.0 m/ s, with a radius of 18.3 m. The centripetal force needed to maintain this motion is 3000 N. What is the plane's mass? What is the solution to the linear equation?-12 + 3b - 1 = -5 - b -11. Where did the concept of Colorism originate in the black community Which of the following is the best example of the diffusion of Americanpopular culture?A. Cafs serving espresso and pastries in FranceB. Hollywood movies being shown in FranceC. French laws that protect the French film industryO D. French food being served at top New York restaurants The minimum period of amount required for emergency fund is1.three months2.six months3.nine months4.one year A professor creates a histogram of test scores for 26 students in a statistics course. What is the probability of a student having scored between 65 and 100 Hola! Me llamo Martha, tengo 21 aos y me gusta trabajar en los hospitales. Quiero ayudar a las madres con los bebs en sus casas y en los hospitales.Based on the reading, what would be the most likely profession for Clementina?1 Comadrona2 Jardinera3 Guardia4 Vendedora The objectivity of site relates to its a hoW can We use the use the concept of rationing device to make our society more skilled and honest?discuss in details using examples Determine the measure of the interior angle at vertex C. PLEASE HELP ASAP Write a story which begins with the words "It was only when I arrived at the house I realized I had forgotten........" (narrative, 500 words)