1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stepan [7]
3 years ago
11

What do i study to become a network engineer?

Computers and Technology
1 answer:
Orlov [11]3 years ago
3 0
I am actually in college studying for this degree.

Based on the curriculum, I have to study some of the college basics, Networking, learn a programming language, computer, hardware, and computer software. 

Mind you, this is me keeping it clean and minimal. If you want more information, look into the your school's curriculum as it varies between schools and states.
You might be interested in
Which symbol is at the beginning and end of a multiline comment block? &&& """ %%% ###
yawa3891 [41]

Answer:

#

Explanation:

I have notes on it we learned it in 8th

7 0
3 years ago
Describe software as a service. what features distinguish it from application software installed on a personal computing device
Triss [41]
???????????????????????????
6 0
3 years ago
Read 2 more answers
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
A business letter should always include the address of the sender.<br> True<br> False
8090 [49]

Answer:

true

Explanation:it is true because like that they could send that letter were it go's so like that they don't have trouble looking for the person's letter

please mark me as brainlist

3 0
3 years ago
Read 2 more answers
Alex has composed a layout with this Image for a magazine. Which rule of composition has Alex applied?
Genrish500 [490]

Answer:

Golden Ratio

Explanation:

7 0
3 years ago
Other questions:
  • You are tasked with setting up an employee’s computer.Instead of a new computer,she will be using a computer with an older opera
    11·2 answers
  • Which of the following is an example of a query with an explicit location? Select all that apply. True False [walmart boston], E
    7·2 answers
  • Text that does not fit in a cell
    7·1 answer
  • How would you compare and contrast the impact of the printing press with the impact of the internet?
    15·1 answer
  • What is the cell reference for row 22 and column B? __________<br><br> In excel
    5·1 answer
  • Aranjează următoarele cuvinte din documentul word Proiect, într-o scrisoare în care soliciți directorului școlii sprijin în priv
    8·1 answer
  • Simple Java programming
    15·2 answers
  • Fill in the blank: Every database has its own formatting, which can cause the data to seem inconsistent. Data analysts use the _
    13·1 answer
  • What is a phone made out of dna
    15·1 answer
  • Which instruction is used to convert an integer value to float and push it onto the fpu stack?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!