If the network administrator found that one of his routers is slow in performance better to check the traffic packet transactions. If any huge file size is been transferred better to disconnect the router and reconnect.
Possible to kill the network task packet so the network speed can be restored.
<u>Explanation:</u>
Moreover, possible to scan the end-user PC or workstation or desktop whether any malware or spyware is affected, if so better to remove that particular PC or workstation or desktop to disconnected from the router.
Updating the PC or workstation or desktop OS patches to be done at regular intervals.
A tasks are suitable for creating an algorithm are:
- giving directions to a location.
- solving a math problem.
- tracking money in a bank account.
- tracking the number of items in inventory.
<h3>What is algorithm?</h3>
An algorithm is known to be a form of a procedure that is often employed in the act of solving a problem or carrying out a computation.
Note that in the case above, A tasks are suitable for creating an algorithm are:
- giving directions to a location.
- solving a math problem.
- tracking money in a bank account.
- tracking the number of items in inventory.
See options below
giving directions to a location
saving time writing a computer program
solving a math problem
tracking money in a bank account
tracking the number of items in inventory
Learn more about algorithm from
brainly.com/question/24953880
#SPJ1
Online library resources
Explanation
Students can utilize online library resources from various campus available for online educational uses.In the library, information on current research in the various displines can be obtained through a search on the book, journal or document.In addition to that, goggle offers academic journals and academic documents prepared by scholars for other academicians to read and get information.
Answer:
False
Explanation:
A Domain Based Security. "Domain Based Security", abbreviated to "DBSy", is a model-based approach that is being used in analyzing information security risks in a business context and offers an apparent, understandable and direct mapping among the risks and the security controls needed to handle them.
While A security domain is the list of items a subject is permitted to access. More largely defined, domains are collections of subjects and objects with related security requirements.
Answer:
examples are:
com or .edu is a top-level domain name (TLD)
cornell.edu is a second-level domain name (SLD)
bigred.cornell.edu is a third-level or three-part domain name
project.bigred.cornell.edu is a fourth-level or four-part domain name
hope this helps you.