1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bingel [31]
4 years ago
7

Mark is the network administrator in his building and is responsible for training all the new technicians on various troubleshoo

ting techniques. He is instructing them on documenting their actions at the end of the troubleshooting process. What should he NOT encourage them to document at that time
Computers and Technology
1 answer:
Rudiy274 years ago
7 0

Answer:

See answer below

Explanation:

He should not encourage his new technicians to document theories that were followed at the end of the troubleshooting process. This because the theory might not add to their knowledge about troubleshooting. What is paramount and needed to be documented for future references are their findings, actions taken by them and the outcome achieved through the whole troubleshooting process.

In trouble shooting, a technician aims at solving problems on computer system by following a set of steps such as establishing theory of probable cause, testing the theory to determine the cause, establishing a plan of action and implementing the solutions; in order to determine and solve the problem.

The theories here are the steps that were followed in determining and solving the observed issues hence should not be documented except the findings, actions taken and the final outcomes that were achieved.

You might be interested in
Which of the following is an example of a data base?
mihalych1998 [28]

See how long I can hold the key down. I forgot there was a max :/

 

hiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii

7 0
3 years ago
Execute the command to know which tcp/ip and udp/ip ports are in use in a system whose ip address is 14.102.98.40.
ddd [48]
I think it is command and the key letter I at the same time
4 0
3 years ago
What do I do if I'm trying to get on a website and this pops up?
Andrew [12]

it means the website is no longer available because someone reported it


3 0
3 years ago
Read 2 more answers
A technician attempts to replace a switch with a new one of similar model from the same vendor. When the technician moves the fi
Liula [17]

Answer:

Corrupted Operating System.

Explanation:

Replacing the switch with a new one and the switch is of similar model and on mving to the fiber and SFP plug and still the switch does not completely booting up and the config files are also same.This happens when the Operating System is Corrupted.So we conclude that the answer is corrupted Operating system.

6 0
4 years ago
Read 2 more answers
Devon keeps his commitments, submits work when it's due, and shows up when scheduled. What personal skill does Devon
mariarad [96]

Answer:

dependability

Explanation:

devon keeps his commitment

5 0
4 years ago
Read 2 more answers
Other questions:
  • What is an effective way to assess user requests for additional features and functions
    10·1 answer
  • Signing up for an IT course where others set the learning goals is an example of what kind of learning?
    10·1 answer
  • The Knowledge Consistency Checker (KCC) ensures the maximum number of hops between any two domain controllers does not exceed wh
    12·1 answer
  • After you set a pin for a domain account on your laptop, that pin can be used only on your laptop. question 17 options:
    7·1 answer
  • Help pleaseeeeeeeeeeeee
    13·2 answers
  • Which of the following is true about a hot site?
    13·1 answer
  • Without a/an ________. a computer is useless
    14·1 answer
  • The File method lastModified() returns
    10·1 answer
  • 1.Discuss the differences and similarities between a peer-to peer network and a client server network.
    8·1 answer
  • Write the definition of the function inputArray that prompts the user to input 20 numbers and stores the numbers into alpha. Wri
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!