1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RUDIKE [14]
1 year ago
8

__________________________would be involved in projects such as implementing security measures and software to protect systems a

nd information infrastructure, including firewalls and data-encryption programs.
Lead Technical Support

Network Security Analyst

Network Architect

Network Administrator/Network Engineer
Computers and Technology
1 answer:
defon1 year ago
3 0

<u>Network Administrator</u><u>/Network Engineer</u> would be involved in projects such as implementing security measures and software to protect systems and information infrastructure, including firewalls and data-encryption programs.

<h3>What does an administrator of a network do?</h3>

The  network administrator is known to be a person who is involved in the day-to-day management of these networks is the responsibility of network and computer system administrators.

They function by helping to plan, set up, and provide maintenance for a company's computer systems, etc., for data communication.

Therefore, <u>Network Administrator</u><u>/Network Engineer</u> would be involved in projects such as implementing security measures and software to protect systems and information infrastructure, including firewalls and data-encryption programs.

Hence, option D is correct.

Learn more about Network Administrator from

brainly.com/question/5860806
#SPJ1

You might be interested in
Which one of these do you need to become president of the US ?
gladu [14]

Answer:

Tbh i dont even know

Explanation:

I had who i wanted to become president but i don't even know anymore

7 0
3 years ago
Read 2 more answers
Write a short-essay discussing your own stand on social media usage for students.​
hjlf

Answer:

More than half of the world’s population uses the internet. This is highlighted by social media users increasing by 21% since 2015, with 2.8 billion users reported globally in 2017.

Humans are social animals. We always like to remain in some group or another, and we prefer to follow what this group does. All of our traditions and cultures are the product of <em><u>this</u></em> group-oriented facet of human nature.Everyone is connected to one another in this vast network generated by the Internet.It illuminates the lives of thousands of people by spreading knowledge internationally, thereby making us global citizens. 

<h2><em><u>NOT</u></em><em><u> </u></em><em><u>COPIED</u></em><em><u> </u></em><em><u>ANSWER</u></em><em><u> </u></em></h2>
3 0
3 years ago
Based on​ Sam's description of an information​ system, all of the following are components of an IS except​ _____.
svetoff [14.1K]

Answer:

the answer is A

Explanation:

My smartness

5 0
3 years ago
You can add additional design elements to a picture by adding a color background, which is accomplished by using what Paint feat
katrin2010 [14]

Answer:

Fill with Color tool

6 0
3 years ago
Write a function sample_median(n,P) that generates n random values using distribution P and returns the median of the collected
TiliK225 [7]

Answer:

import numpy as np

def sample_median(n, P):  

   return np.median( np.random.choice ( np.arange (1, len(P) + 1 ), n, p = P ) )

print(sample_median(10,[0.1 0.2 0.1 0.3 0.1 0.2]))

print(sample_median(10,[0.1 0.2 0.1 0.3 0.1 0.2]))

print(sample_median(5, [0.3,0.7])

print(sample_median(5, [0.3,0.7])

Explanation:

  • Bring in the numpy library to use the median function provided by the numpy library.
  • Define the sample_median function that takes in 2 parameters and returns the median with the help of built-in random, choice and arrange functions.
  • Call the sample_median function by providing some values to test and then display the results.    

Output:

4.5

4.0

2.0

1.0

7 0
3 years ago
Other questions:
  • Tower defense is included under which genre of game
    15·2 answers
  • 1. An Excel file is called a workbook?<br> A) True<br> B) False
    6·2 answers
  • Can Word Processing (WP) programs be used for DTP? Explain your answer
    7·1 answer
  • Some numbers are formed with closed paths. the digits 0, 4, 6 and 9 each have 1 closed path and 8 has 2. None of the other numbe
    6·1 answer
  • Which tool will select the lines of a sketch in digital software?
    7·1 answer
  • What will the following code display? int numbers[4] = { 99, 87 }; cout &lt;&lt; numbers[3] &lt;&lt; endl; a. 87 b.0 d. 34. What
    12·1 answer
  • (Reverse number) Write a program that prompts the user to enter a four-digit inte- ger and displays the number in reverse order.
    9·1 answer
  • Why does the peot use a simular pharase at the beggining of each stanza
    8·1 answer
  • Buying a home security system is an example of protecting your home against________.
    5·1 answer
  • The capability of moving a completed programming solution easily from one type of computer to another is known as ________. Grou
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!