1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tamaranim1 [39]
3 years ago
11

How can a network design project benefit from the principles of itsm? How might itsm impede a network design project?

Computers and Technology
1 answer:
Paladinen [302]3 years ago
6 0

Answer:

1. How can a network design project benefit from the principles of ITSM?

2. How might ITSM impede a network design project?

(See explanation below)

Explanation:

1.

ITSM place its utmost attention on the process than it does on technology. It renders assistance to IT firms to take their users as their clients and customers instead of seeing them as just source of problem adversaries.

2.

When the design process of a network design project either falls below standard or when the design process tries to cut corners because of budget cuts.

You might be interested in
When did internet came to existence?
Luden [163]
1982 the Internet protocol was introduced as the standard network protocol on the ARPANET.

1981 access to the ARPANET was expanded.
7 0
3 years ago
Which keyboard feature is a form feed character?
Sever21 [200]

Answer:

B

Explanation:

The form feed character code is defined as 12 (0xC inbhexademical), and may be represented as control+L or^L. In a related use, control+L can be used to clear the screen in Unix shells such as bash. In the C programming language ( and other languages derived from C ), the form feed character is represented as '\f'.

5 0
3 years ago
The word count of the active document is typically displayed on the ________.
romanna [79]

Click the Word Count in the Proofing Group. Maybe the name is the Bottom ribbon tab

4 0
3 years ago
Which of the following are incorrect? Group of answer choices An interface can contain constructors. You may declare a final abs
spin [16.1K]

Answer:

Explanation:

1. The answer is No, interface cannot have constructors. ... In order to call any method we need an object since there is no need to have object of interface, there is no need of having constructor in interface (Constructor is being called during creation of object).

2.A final class is considered complete and can not be subclassed (It's methods can not be overridden ). In case of abstract class, we have to proved implementation to abstract methods in subclasses. A final class can not have abstract methods and an abstract class can not be declared final.

3.private constructors are acceptable, however the class should be marked final instead, as doing so means the class is to be extended.

4.Yes! Abstract classes can have constructors! Yes, when we define a class to be an Abstract Class it cannot be instantiated(i.e an object cannot be created) but that does not mean an Abstract class cannot have a constructor. Each abstract class must have a concrete subclass which will implement the abstract methods of that abstract class.

6 0
3 years ago
Read 2 more answers
Use the drop down menus to describe how adman can add shapes to his presentation
alina1380 [7]

Answer:

✔ Illustrations

✔ a crosshair

✔ left-click and drag

Explanation:

6 0
3 years ago
Other questions:
  • Write a program that takes in a line of text as input, and outputs that line of text in reverse. The program repeats, ending whe
    12·1 answer
  • What are the two different frequencies WiFi operates on?
    9·2 answers
  • What cable should i be using to connect my android tablet to the pc?
    13·2 answers
  • A form of speech that is used to clarify, describe, demonstrate, and/or explain is referred to as _____.
    7·2 answers
  • What is the keyboard shortcut to display the merge to printer dialog box?
    5·1 answer
  • Why might you complete a 1040 instead of a <br> 1040ez
    11·2 answers
  • Which steps will create a new blank word document
    9·1 answer
  • When browsing using certain browsers, if a page is known to be malicious or using phishing techniques in the past a browser may
    5·1 answer
  • Write a class called TextProcessor that implements the methods listed below. Your implementation may use the charAt() and length
    14·1 answer
  • Patricia Works in a coffee shop and manages the inventory of items.for each item she needs to recover the quantity in stock and
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!