1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pshichka [43]
3 years ago
6

What is most important for you to choose before you build a network?

Computers and Technology
1 answer:
lbvjy [14]3 years ago
3 0

i'm needing help with the same question but mine gave choices, could you help please? thanks

A.  

private network

B.  

NOS

C.  

network media

D.  

network protocol

E.  

directory service

You might be interested in
Which type of hacker represents the highest risk to your computer?
Deffense [45]

Answer:

The hacker which represents the highest risk to my computer is the Script Kiddie.

Explanation:

A Script Kiddie cannot make their own programs.

They hack by using existing codes, scripts, web shells etc to access a work station, mutilate webpages etc.

The difference between a Hacker and a Script Kiddie is that a hacker does not need another person's code. They are skilled at writing their own codes which are can be very potent. This level of skill can be difficult to attain except for very bright minds.

The script kid needs very little knowledge of scripts and they are well on their way to causing damage.

Cheers!

4 0
3 years ago
So I was wondering how I should get into Game Development?
Hunter-Best [27]
Tbh i depends on what kind of person you are. If you really like video games then go ahead but i guess what you are asking is how and that really doesnt answr your question but 
1) YOU HAVE TO BE FULLY COMMITTED/ MOTIVATED TO THE GAME
that is the number 1 step.Also try to do a little research on the game and the systems, watch videos on how to take the system apart and back together.
I HAVE FAITH IN YOU!!!  YOU CAN DO IT!!! TAKE CHARGE

8 0
3 years ago
Network forensic analysis. A network forensic analyst is responsible for identifying worms, viruses, and infected nodes in the c
Phantasy [73]
<h3>What is Network forensics ?</h3>

Network forensics is the procedure of tracking packets and reading community site visitors hobby for intrusion or malware detection. It entails figuring out an issue, amassing and reading data, choosing the great troubleshooting response, and imposing it.

The probability distribution is 1.25.

Read more about the probability distribution:

brainly.com/question/24756209

#SPJ1

5 0
2 years ago
Choose the correct term to complete the sentence.
Andre45 [30]

Answer:

Technology

Explanation:

Edge 2021

8 0
3 years ago
Write a Python program to convert temperatures to and from celsius, fahrenheit.
Rudiy27

Answer:

https://www.w3resource.com/python-exercises/python-conditional-exercise-2.php

3 0
3 years ago
Other questions:
  • Changeover means that ____. (select all that apply)
    7·2 answers
  • Mm
    10·1 answer
  • While a hard drive is running, even a slight bump against the computer may cause the
    9·2 answers
  • Robert needs to apply formatting from one set of text to multiple other sets of text throughout the document. Which option shoul
    7·1 answer
  • WILL GIVE BRAINLIEST TO FIRST AND BEST ANSWER!
    10·1 answer
  • Write the percentage 5 1/4 as a decimal​
    8·1 answer
  • Among the following, which is the best protection against ransomware?
    8·1 answer
  • What is the first thing you should do when troubleshooting a computer problem
    5·2 answers
  • A man-made world event that would affect the labor market would be a(n) _____.
    13·1 answer
  • A term to describe articles that can be displayed in their entirety,as opposed to abstract and references only
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!