1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nadusha1986 [10]
2 years ago
14

you have been using snmp on your network for monitoring and management. you are concerned about the security of this configurati

on. what should you do?
Computers and Technology
1 answer:
Zinaida [17]2 years ago
6 0

The thing that should be done is to implement version 3 of SNMP.

<h3>How to depict the information?</h3>

In this situation, the person has been using snmp on your network for monitoring and management. you are concerned about the security of this configuration.

Therefore, since the person is concerned about the security of this configuration, the thing that should be done is to implement version 3 of SNMP.

Learn more about configuration on:

brainly.com/question/26084288

#SPJ12

You might be interested in
after installing a second hard drive what needs to be done to the hard drive and what do these 2 tasks do?
PIT_PIT [208]
To make it useable, the disk first needs to be subdivided into logical volumes, then formate, so that it is readable by the systems.
6 0
3 years ago
What is meant by byte in computer terminology​
dsp73

Answer:

Byte, the basic unit of information in computer storage and processing. A byte consists of 8 adjacent binary digits (bits), each of which consists of a 0 or 1. The string of bits making up a byte is processed as a unit by a computer; bytes are the smallest operable units of storage in computer technology.

Explanation:

Can I be brainliest? TYSMMMMMM      

7 0
3 years ago
Read 2 more answers
You would like to help guide your company in choosing between valuing privacy and increasing the company's bottom line. What is
Ainat [17]

In the above case, the option that will help to guide your company in choosing between valuing privacy is a set of internal principles.

<h3>What are internal control principles?</h3>

The principles of internal control are known to be  needed in the management to set methods in place to make sure that company assets are kept.

Therefore, In the above case, the option that will help to guide your company in choosing between valuing privacy is a set of internal principles.

Learn more about internal principles from

brainly.com/question/27015769

#SPJ1

6 0
2 years ago
Which of the following statements is not true? Question 16 options: a) SQL is the most popular query language used for interacti
lisov135 [29]

Answer:

The answer to this question is option "d".

Explanation:

In this question option d (A user fills out a form to construct a description of the data desired in a SQL search) is not true. Because SQL stands for Structured Query Language. This is a query language used to communicate with a database and a user fills the form. Which is not possible in the SQL. So the option d is not true.

4 0
3 years ago
Can someone please help me with this pleaseeeee
vladimir1956 [14]

Answer:

The answer of this question is given below into explanation section

Explanation:

answer (a)

I visited the carrerbuilder dot com and search for data entry job. The link of the posting is given below

https://www.careerbuilder.com/jobs?utf8=%E2%9C%93&keywords=data+entry&location=

answer(B)-Requirements of the the job

  • Previous office experience (data entry experience a plus)
  • Proficient with a computer and computer software (Excel knowledge required)
  • Excellent verbal and written communication skills
  • The ability to multi-task and work in a team-oriented environment
  • High School Diploma / G.E.D.
  • Ability to meet background check and drug screening requirements

answer(C)-Tasks of the job

  • Open, sort, and scan documents
  • Track all incoming supplies and samples
  • Data entry of samples that come in
  • Assist with documentation and maintaining of data
  • Prepare and label information for processing
  • Review and correct any data entry error or missing information

answer (d)

I have 3 years of experience in organization administration where I managed the organization data, generated reports and communicated verbally and written within the organization efficiently.

6 0
3 years ago
Other questions:
  • How to search for the largest files on my computer vista?
    5·1 answer
  • 1. Do you consider Facebook, MySpace, and LinkedIn forms of disruptive or sustaining technology? Why?
    15·1 answer
  • What linux command is used to change file permissions?
    10·1 answer
  • Which behavior of the application should the user expect? A user profile has login hour restrictions set to Monday through Frida
    12·1 answer
  • You insert a comment in a worksheet by using a command on the ____ tab on the Ribbon.
    13·1 answer
  • The I/O modules take care of data movement between main memory and a particular device interface.A. TrueB. False
    9·1 answer
  • Leah wants to add an image to her updated presentation, so she wants to access the Help interface. What should Leah do to access
    11·2 answers
  • Document accurately describes the differences between servers and computers and between local and wide area networks. Document p
    5·1 answer
  • A line graph is a great tool for showing changes over time. Why is a line graph better than other graphs at showing this type of
    6·1 answer
  • Question 7 Consider the following code:
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!