1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stepan [7]
4 years ago
11

What do i study to become a network engineer?

Computers and Technology
1 answer:
Orlov [11]4 years ago
3 0
I am actually in college studying for this degree.

Based on the curriculum, I have to study some of the college basics, Networking, learn a programming language, computer, hardware, and computer software. 

Mind you, this is me keeping it clean and minimal. If you want more information, look into the your school's curriculum as it varies between schools and states.
You might be interested in
Determine which system you would recommend each of the customers use based on their provided user and system specs.
Ratling [72]

Answer:

Hope this helps pls mark brainiest

Explanation:

<h2> </h2><h2>So we know Student B is gonna get a computer, but its not stated if its A desktop or laptop. hmm,.. So ima do both for the desktop he would what a computer with "Ethernet Storage Fabrics: 25GbE, 50GbE" because If he going to do videos in todays standers it would be in 4k and 8k. he would also need at least 16 of ram if not 32gb. and since he has no cap budget I would personally go for the i9, but he can go for the i7, not much of a fan of the i5 for video productive, for storage he would need a lot for video editing or other stuff so I would go for the main boot (sys) a  and for the actually storage for the videos I would go for a  with good rpm. For  I would go for something with 8-10 or higher.</h2>

7 0
2 years ago
What objective behaves like a high level array
zavuch27 [327]

Answer:

C.Vector

Explanation:

Vector is a high level array used in C++.It has the capability of resizing itself when it gets full.it has many functions that increases it's functionality like size(),begin(),end(),erase(),clear(),push_back(),pop_back() and many more and we store any kind of data type in the vector.

syntax for declaring a vector:-

vector<data type> vector name.

8 0
3 years ago
Which of the followings is design tool?[2 marks]
aalyn [17]

Answer:

Data Flow Diagram

Explanation:

Data flow diagram is representation of data which is processed in terms of input and output.It is a tool for designing the structure for a software.Rectangles,square and circles are used in representing the flow of information.

DFD consists two components

  • Layers-It consist many layers,the top layer is called context diagram.
  • Levels-The first level shows the main process of the system.
6 0
3 years ago
Provide an example by creating a short story or explanation of an instance where confidentiality would be broken.​
Reil [10]

Explanation:

Personal Insurance

Confidentiality in the workplace: What you need to know

When you give advice to clients or patients for a living, you'll know that protecting sensitive and personal information is crucial. But are you clear on what counts as a breach of confidence or what to do if one occurs?

From how to protect confidential information, to what breaches of confidence look like for different jobs, here's what you need to know about confidentiality in the workplace.

What is a breach of confidentiality?

In short, a confidentiality breach is the disclosure of information to someone without the consent of the person who owns it. In other words, failing to respect a person's privacy or the confidence in which they gave the information or data to you, by passing it onto someone else.

Why is confidentiality important?

Protecting confidential information is vital. If you're in a position where you have access to or are given this type of data at work, your career relies on your ability to keep patient or client confidentiality. If you don't, you could lose trust and integrity in the eyes of your existing (and potential future) clients, who could terminate your contract and take legal action against you.

Therapist/patient confidentiality

Unsurprisingly, patient confidentiality is highly important for therapists and counsellors. It forms part of the therapeutic frame of appropriate boundaries, which creates a safe space for a good working relationship to form.

Here’re some examples of ways you could unintentionally break patient/therapist confidentiality:

Sharing confidential information about a client with a family member or friend

Talking about confidential information somewhere you can be overheard

Leaving your computer containing confidential information open to others

Continuing to work with a client when there's a conflict of interests (for example, they know one of your family members or friends)

When permission to share information is given but isn't specific, this can create confusion and result in a potential breach (for example, a patient may give permission for their information to be shared with a teacher but not their GP)

7 0
4 years ago
Why am I asked the 4th time to change my email &amp; password?????
dolphi86 [110]
Confirme your email.
3 0
3 years ago
Read 2 more answers
Other questions:
  • Rachel is on her way to an interview for the position of a project manager. She is trying to prepare for this interview by analy
    6·1 answer
  • A low-level language has a low level of ___________ because it includes commands specific to a particular cpu or microprocessor
    5·1 answer
  • Which of these practices should you follow while creating your résumé?
    14·1 answer
  • Difference between query and filter<br><br>​
    12·1 answer
  • Write a program segment that simulates flipping a coin 25 times by generating and displaying 25 random integers, each of which i
    5·1 answer
  • Write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither.
    10·1 answer
  • Me pueden decir todo lo que sepan sobre las redes informáticas porfa? De preferencia que sea algo largo
    12·1 answer
  • 18. What do we call the Microsoft Word File?
    11·1 answer
  • Write a program that stores the maximum of three values. The values are stored in $s0, $s1, and $s2. Store the result in $s3. No
    6·1 answer
  • Which of the following file formats allows you to share and save documents
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!