1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erica [24]
3 years ago
9

A network engineer arrives at work and discovers that many users are having problems when attempting to connect to the company n

etwork shared drives. The network operations center (NOC) technician just completed server upgrades the night before. To which of the following documents should the NOC technician refer to determine what potentially caused the connectivity problem?
A. Network maps
B. Cable management
C. Release notes
D. Change management
Computers and Technology
2 answers:
skad [1K]3 years ago
4 0

Answer: Change management

Explanation:

The change management document contains the entire details regarding the changes that could be brought about in the network. It starts with identifying the change, Then it goes for approval of the change and finally if it is approved then the change is implemented in the final step.

Some of the documents in change management are:

1. change management planning

2. the scope of the change

3. create the project plan for the identified scope.

4. The associated risk management plan.

S consulting the change management the NOC technician could know where the problem is as it contains detail of the data entry and the related risk  and mitigation's in the change management document.

Airida [17]3 years ago
3 0

Answer:

Change management is the correct answer.

Explanation:

In this case, it is necessary to mention that the change management document has the details that refer to the potential changes that can be applied in the network. First, it identifies the change; after that, it asks for approval of this change; in third and last, the change is put in practice whether it is approved.

You might be interested in
Bunco is a dice throwing game that requires no decisions to be made or skill on the part of the player just luck. In the simples
anygoal [31]
Abcdefghijklmnopqrstuvwxyz now I know my abcs, next time won’t you sing with me :)
8 0
2 years ago
What is the car on the right?
oksano4ka [1.4K]

looks like a rxc custom gt3 with a v6 *badass sport car*

3 0
2 years ago
A software computer error, is a error produced by the malfunctioning of a computer part. E.g. RAMImmersive Reader
Andru [333]

Answer:

? is this you question true or false because i dont know the answer yet

Explanation:

4 0
3 years ago
Repl.it Assignment 4.1.3 (Max and Min)<br> Please help me<br> I will give brainliest and a like
earnstyle [38]
-31 or 21- 50 it may also carry -31
3 0
3 years ago
What is element 115 and what is it from?<br> Also what did it do?
tekilochka [14]
Its temporary name, which is being used as a placeholder, is ununpentium. Element 115<span> is one of a number of super heavy </span>elements—elements<span> with an atomic number greater than 104—that are so short-lived, they can't be detected in nature. ... Creation of </span>element 115<span> during a particle collision of americium and calcium atoms</span>.
7 0
2 years ago
Other questions:
  • The purpose of the ________ element is used to configure the main content of a web page document.
    5·1 answer
  • The measure of the maximum amount of data that can travel through a computer’s communications path in a given amount of time is
    9·1 answer
  • #We've started a recursive function below called #measure_string that should take in one string parameter, #myStr, and returns i
    5·1 answer
  • Which of the following is not an example of technological progress? A: new scientific knowledge that has practical applications
    12·2 answers
  • Describe the following types of data hazards. RAW WAR WAW
    13·1 answer
  • What integer is represented by the following 8-bit twos complement representation: 1011 0000 ? (Enter your number in decimal, an
    6·1 answer
  • 1. provide at least 3 properties and 3 methods of the object computer.
    8·1 answer
  • ____ testing is a straightforward testing technique that looks for vulnerabilities in a program or protocol by feeding random in
    6·1 answer
  • What feature sets Macs apart from other operating systems?
    5·1 answer
  • What are different social phenomenas are you aware of that used part of a social movement, change, or cause
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!