What must she try next

Assignment Help Computer Engineering
Reference no: EM1333770

Linda has been assigned the job of connecting five computers to a network. The room holding the five computers has three network ports that connect to a hub in an electrical closet down the hallway. Linda decides to install a second hub in the room. The new hub has four network ports. She uses a crossover cable to connect one of the four ports on the hub to a wall port. Now she has five ports available (two wall ports and three hub ports). While installing and configuring the NICs in the five computers, she discovers that the PCs connected to the two wall ports work fine, but the three connected to the hub refuse to communicate with the network. What could be wrong and what should she try next?

Reference no: EM1333770

Questions Cloud

Computing the value of bond : Suppose that two years after the bonds were issued, the required interest rate fell to 7 percent. What would be the bond's value?
Reforming state legislature : How would you justify these reforms to a state legislature?
Differences between qualitative and quantitative : Describe the differences between Qualitative and Quantitative and use a real example of using these differences.
Bounded ethicality play a role in decision : How did bounded ethicality play a role in these decisions?
What must she try next : Linda has been assigned the job of connecting 5 computers to a network. The room holding the 5 computers has three network ports that connect to a hub in the electrical closet down the hallway.
Explain how can these limits to reimbursement : Explain how can these limits to reimbursement be viewed as the exercise of monopsony power.
Explain the employee training and development : Explain the employee training and development practices that you would recommend in Germany and describe the performance appraisal and evaluation considerations
Primary and secondary data for research : Using both primary and secondary data for research can be useful.
Determining bond amortization schedule : Compute the total bond interest expense over the bond's life. Prepare an effective interest amortizatoin table. Prepare the journal entries to record the first two interest payments.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Significant investigative approachesfor cyber crime cases

Research information related to how the computer forensics investigators in today’s world of the computer forensics investigations prepare for the execution of an actual investigation.

  How will you explain how arrays are used

If you were explaining an array ti a friend who is learning Java. how will you do so?

  Write a report on how to used them

For several of the commands, you require to practice them on some files.

  Write down a javascript function to validate a text field

Write down a JavaScript function to validate a text field on a form for holding a positive integer value, without using any inbuilt functions like IsNaN and so forth. If the text field contains a valid number then the JavaScript function would ret..

  Troubleshooting the infected system

AV software has eliminated the malware from a highly infected system. After first reboot, an error message is displayed which consists of a reference to the strange DLL file which is missing.

  Design a function that computes a taxi fare

Write down a function that computes a taxi fare. In some cities, taxi fares are calculated based on start and end zones plus a per-minute charge. In this city, there are three zones (1, 2, and 3) and a graduated scale for time.

  Write a java application which finds the total

Write down a JAVA application that finds the total and average of odd numbers from 1 to 15. Your JAVA program must use a counted loop to accomplish this task.

  What aspect of data is problematic

What aspect of data is problematic

  What will be the list assumptions for the scope of project

What will be the list assumptions for the scope of project? Give detailed and measurable non functional requirements.

  Point-to-point communication links

Suppose there is the wide-area network with N nodes, where N ≥ 2. Find out the smallest number of the point-to-point communication links such that each node within the network is able to talk to one another node?

  Active and passive tcp connection

At the time of establishment of the TCP session between 2 BGPv4 peers one is developed as active and the other as passive.

  Consumer protection view

The free market view and The consumer protection view.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd