1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erica [24]
3 years ago
9

A network engineer arrives at work and discovers that many users are having problems when attempting to connect to the company n

etwork shared drives. The network operations center (NOC) technician just completed server upgrades the night before. To which of the following documents should the NOC technician refer to determine what potentially caused the connectivity problem?
A. Network maps
B. Cable management
C. Release notes
D. Change management
Computers and Technology
2 answers:
skad [1K]3 years ago
4 0

Answer: Change management

Explanation:

The change management document contains the entire details regarding the changes that could be brought about in the network. It starts with identifying the change, Then it goes for approval of the change and finally if it is approved then the change is implemented in the final step.

Some of the documents in change management are:

1. change management planning

2. the scope of the change

3. create the project plan for the identified scope.

4. The associated risk management plan.

S consulting the change management the NOC technician could know where the problem is as it contains detail of the data entry and the related risk  and mitigation's in the change management document.

Airida [17]3 years ago
3 0

Answer:

Change management is the correct answer.

Explanation:

In this case, it is necessary to mention that the change management document has the details that refer to the potential changes that can be applied in the network. First, it identifies the change; after that, it asks for approval of this change; in third and last, the change is put in practice whether it is approved.

You might be interested in
A user called to inform you that the laptop she purchased yesterday is malfunctioning and will not connect to her wireless netwo
Aloiza [94]

Answer:

B. Have the user press the appropriate function key combination to enable the wireless radio and then attempt to connect to the wireless network.

Explanation:

Every more often than not, users may experience wireless connection problems. How they respond to these issues solely depends on various factors. When a user like this has issues connecting to the network, first on the list of proper troubleshooting procedures is to check whether the wireless adapter or the function key that turns the wireless radio connection on is toggled on. Sometimes the most obvious causes are the hardest to see. The user should check this first because it will save him or her lots of troubleshooting time if the switch was simply physically disabled.

6 0
3 years ago
A perfect binary tree is a complete binary tree with all levels fully filled. Add a method in the BST class to return true if th
algol [13]

Answer:

class BST {

static class Node

{

int val;

Node left, right;

}

static boolean checkPerfectBT(Node node, int h, int d)

{

if (node == null)

return true;

 

if (node.left == null && node.right == null)

{

if(h==d+1)

return true;

else

return false;

}

 

if (node.left == null || node.right== null)

return false;

 

return checkPerfectBT(node.left, h, d+1) && checkPerfectBT(node.right, h, d+1);

}

static int height(Node node)

{

int dep = 0;

while (node != null)

{

node = node.right;

dep=dep+1;

}

return dep;

}

static boolean isPerfectBT(Node node)

{

int h = height(node);

return checkPerfectBT(node, h, 0);

}

 

static Node addNode(int x)

{

Node node = new Node();

node.val= x;

node.right = null;

node.left = null;

return node;

}

public static void main(String args[])

{

int i,j,k;

Node node= null;

node = addNode(34);

node.left = addNode(2);

node.right = addNode(322);

 

node.left.left = addNode(21);

node.left.right = addNode(23);

node.right.left = addNode(37);

node.right.right = addNode(54);

 

if (isPerfectBT(node) == true)

System.out.println("This is a Perfect Binary tree");

else

System.out.println("This is Not a perfect Binary Tree");

}

}

Explanation:

  • Calculate the depth of BST by using a while loop until it reaches a null value.
  • In the addNode method, make an object of Node class.
  • In the main method, pass the values to addNode method.
  • Finally display the relevant message to show if it's Perfect or not.
6 0
3 years ago
Which is true regarding pseudocode?
drek231 [11]

Answer:

It uses simple words and symbols to communicate the design of a program.

Explanation:

4 0
3 years ago
Read 2 more answers
your company decides to implement a RAID-5 array on several file servers. Which feature is provided by this deployment
Novay_Z [31]

Answer:

High availability

Explanation:

RAID-5 array is defined as a redundant array for independent disk configuration which makes use of the disk striping with the parity. It consists of a minimum three disk drives and it uses the data striping and the parity data to provide the redundancy.

RAID 5 is a powerful tool to ensure integrity of the data. It provides both performance as well as security to the data.

In the context, "high availability" is the feature that is provided by the deployment of RAID 5 array on the several file services.

4 0
3 years ago
As we have seen in this chapter, public-key cryptography can be used for encryption and key exchange. Furthermore, it has some p
Savatey [412]

Answer:

Disadvantages of public key cryptography is that : Assymetric cryptography is slower than the private key cryptography.

Explanation:

We are dealing with big data applications most of time. Almost all applications are data intensive. Private key cryptography which is also known as symmetric cryptography. Symmetric cryptography based systems are faster. Since there is no key transmitted with the data, encrypted data can be transferred over the channel or session even if the path is vulnerable or have chances of interception as the chances of decrypting the data is almost impossible.

Also, The identity of the receiver is guaranteed using the password based authentication used by symmetric crypto systems. Only the trusted receiver who has the access to the secret key can only decrypt the payload

Public Key Cryptography is slower than private key cryptography. Today’s application’s are data intensive. In case of data intensive applications , encrypting huge data will take a lot more time than that of symmetric key cryptography. Whenever Bulk data transmission is needed symmetric key cryptography is preferred. Secret key based crypto systems have proven to be more faster than any currently available assymetric key based crypto systems.

7 0
3 years ago
Other questions:
  • You can write as many constructors for a class as you want, as long as they all have different ____ lists.
    8·1 answer
  • The ________ option contains the formatting and placeholders for all of the items that appear on a side.
    11·1 answer
  • Your boss is very skeptical about the idea of storing his files up in the cloud rather than on a local storage drive. He asks yo
    7·1 answer
  • Complete the sentence about entering and editing data in a cell in a spreadsheet.
    13·1 answer
  • B. List any four major drawbacks of the first generation computer​
    10·1 answer
  • Which feature of dart helps in making the code readable,maintainable and finds type error during compile time
    15·1 answer
  • Explain the three schemes via which the binding of instructions and data to memory addresses can be done. In each scheme, how th
    13·1 answer
  • PLEASE HELP ITS CODING AND I INCLUDED A SCREENSHOT OF WHAT TO DO
    14·1 answer
  • The User Datagram Protocol (UDP) is called the connectionless protocol because: It does not attempt to fix bad packets but resen
    8·1 answer
  • Assume the user types in 7 for x and 2 for y. What is output by the
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!