1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bingel [31]
4 years ago
7

Mark is the network administrator in his building and is responsible for training all the new technicians on various troubleshoo

ting techniques. He is instructing them on documenting their actions at the end of the troubleshooting process. What should he NOT encourage them to document at that time
Computers and Technology
1 answer:
Rudiy274 years ago
7 0

Answer:

See answer below

Explanation:

He should not encourage his new technicians to document theories that were followed at the end of the troubleshooting process. This because the theory might not add to their knowledge about troubleshooting. What is paramount and needed to be documented for future references are their findings, actions taken by them and the outcome achieved through the whole troubleshooting process.

In trouble shooting, a technician aims at solving problems on computer system by following a set of steps such as establishing theory of probable cause, testing the theory to determine the cause, establishing a plan of action and implementing the solutions; in order to determine and solve the problem.

The theories here are the steps that were followed in determining and solving the observed issues hence should not be documented except the findings, actions taken and the final outcomes that were achieved.

You might be interested in
Which term refers to a shorthand method for identifying network and host bits in an ip address?
zloy xaker [14]

A CIDR Notation is known as the term that refers to a shorthand method for identifying network and host bits in an ip address.

<h3>What is CIDR Notation?</h3>

This is known to be a term that was devised in 1993 by the IETF. The  CIDR is said to be a  shorthand method for knowing network and host bits in an IP address.

Therefore, one can say that A CIDR Notation is known as the term that refers to a shorthand method for identifying network and host bits in an ip address.

Learn more about CIDR Notation from

brainly.com/question/14985928

#SPJ12

7 0
2 years ago
What is the function of the NOS? Select all that apply.
Zigmanuir [339]

Answer:

.network management

Explanation:

pls need brainliest

3 0
3 years ago
Read 2 more answers
Which social network site has 1.5 billion actives users per month?
aksik [14]
I think it is Twitter.
6 0
3 years ago
What is the purpose of filters in a database?
malfutka [58]

Answer:

A: Filters allow you to see only the records that meet specific criteria.

Explanation:

Imagine you having a database full of first and last names. You could use a filter to only show the people who have a specific first or last name.

6 0
4 years ago
Declare and initialize the following variables: int monthOfYear, initialized to the value 11 long companyRevenue, initialized to
lianna [129]

Answer:

Following are the declaration and the initialization of variable

int monthOfYear=11;  // variable declaration of integer

long companyRevenue=5666777; // variable declaration of long

int firstClassTicketPrice=6000;  // variable declaration of int

long totalPopulation=1222333; // variable declaration of long

Explanation:

Following are the description of Statement

  • Declare a variable " monthOfYear "  as integer type and initialized  11 to them .
  • Declare a variable " companyRevenue "  as long type and initialized  5666777 to them .
  • Declare a variable "  firstClassTicketPrice"  as integer type and initialized 6000 to them
  • Declare a variable " totalPopulation "  as Long type and initialized 1222333  to them .
4 0
3 years ago
Other questions:
  • (PLS HELP 99 POINTS) In a paragraph of no less than 125 words, explain the three aspects involved in gaining a true appreciation
    14·2 answers
  • What state yall be livin in?
    15·2 answers
  • How long is the latency time of a typical hard-disk drive spinning at 360 revolutions per second?
    6·1 answer
  • “You have been blocked”
    5·2 answers
  • True or False: Assuming that all variables are defined, the following segment of code is invalid. if ( x &gt; 0 )
    10·1 answer
  • What type of photography is represented by a photograph of a dog on a beach ?
    11·1 answer
  • The term _____________ refers to software license agreements that are included within a box of physical-media software.
    9·1 answer
  • Imagine you were trying to explain the Russian hacking incident to a child (around 10 years of age) and why it was unethical. Cr
    6·1 answer
  • I don't want my large video files using up all my hard drive space . Can I archive my videos in on DVDs or Blu Rays?
    8·1 answer
  • Why it is not recommended to add sound effect on slide transition? Write at least two reasons.​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!