1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erica [24]
3 years ago
9

A network engineer arrives at work and discovers that many users are having problems when attempting to connect to the company n

etwork shared drives. The network operations center (NOC) technician just completed server upgrades the night before. To which of the following documents should the NOC technician refer to determine what potentially caused the connectivity problem?
A. Network maps
B. Cable management
C. Release notes
D. Change management
Computers and Technology
2 answers:
skad [1K]3 years ago
4 0

Answer: Change management

Explanation:

The change management document contains the entire details regarding the changes that could be brought about in the network. It starts with identifying the change, Then it goes for approval of the change and finally if it is approved then the change is implemented in the final step.

Some of the documents in change management are:

1. change management planning

2. the scope of the change

3. create the project plan for the identified scope.

4. The associated risk management plan.

S consulting the change management the NOC technician could know where the problem is as it contains detail of the data entry and the related risk  and mitigation's in the change management document.

Airida [17]3 years ago
3 0

Answer:

Change management is the correct answer.

Explanation:

In this case, it is necessary to mention that the change management document has the details that refer to the potential changes that can be applied in the network. First, it identifies the change; after that, it asks for approval of this change; in third and last, the change is put in practice whether it is approved.

You might be interested in
As a member of the help desk administration team, you've been assigned to update the driver for the network adapter that is inst
damaskus [11]

The Windows utility that will allow you to manually update this new driver is called the Device Manager.

<h3>What is a Device Manager?</h3>

This is known to be a form of Computer program or a kind of a component of  a Microsoft Windows operating system that is said to give room for one to be able to see and control the hardware that is said to be attached to the computer.

Hence, The Windows utility that will allow you to manually update this new driver is called the Device Manager.

Learn more about Windows utility from

brainly.com/question/20659068

#SPJ1

6 0
2 years ago
What were precomputed tables and why were they necessary?​
Alex Ar [27]

Answer:

In algorithms, precomputation is the act of performing an initial computation before run time to generate a lookup table that can be used by an algorithm to avoid repeated computation each time it is executed.

7 0
3 years ago
Read 2 more answers
"You are setting up a new subnetwork on an existing network. Management has asked that you use existing cabling that the company
NemiM [27]

Answer:

T10BASE-T networks require a minimum of Category 3 cable and connection hardware for proper operation.

Explanation:

The characteristics of this cable:

1. Complies with EIA / TIA - 568-B ISO / IEC 11801 Class C

2. 0.51 mm (24 AWG) solid copper conductor

3. PE (Polyethylene) insulation,

4. PVC outer cover,

5. no flame propagator and

6. self-extinguishing.

7. Twisted pair

8. SUITABLE FOR VOICE AND DATA INSTALLATIONS FROM 10Mbps to 16Mbps.

<u>It is suggested to buy the complete coil to change the wiring gradually. </u>

7 0
3 years ago
Select the correct answer..
kicyunya [14]

Answer:

A mid shot or medium shot

Explanation:

4 0
2 years ago
Yall like portal 1 or 2
balu736 [363]

yessir i like 2 better cause the plot is better

8 0
3 years ago
Other questions:
  • You can encrypt individual files, but microsoft recommends encrypting at what level?
    9·1 answer
  • Describe how to manipulate artwork in a presentation.
    13·1 answer
  • The four key stages with regards to data visualization workflow. Select one key stage and explain it briefly about that stage.St
    10·1 answer
  • To defragment a disk means to ____. slow it down, diagnose problems with it, reorganize it, repair it
    8·1 answer
  • Create a program that generates a report that displays a list of students, classes they are enrolled in and the professor who te
    11·1 answer
  • Which of the following is NOT a fall prevention system?
    12·2 answers
  • For demultiplexing a UDP socket is identified by:_____.
    15·1 answer
  • When writing code, how can printing be useful?
    15·1 answer
  • Kris is the project manager for a large software company. Which part of project management describes the overall project in deta
    11·2 answers
  • Second Largest, Second Smallest Write a program second.cpp that takes in a sequence of integers, and prints the second largest n
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!