1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Schach [20]
3 years ago
8

Which two tasks are responsibilities of a network administrator?

Computers and Technology
1 answer:
Vesna [10]3 years ago
7 0

1.Configuring network hardware like servers, routers and switches.

2.Upgrading and repairing computer networks.

3.Troubleshooting network issues.

4.Assisting network architects with the design of network models.

5. Deploying and updating software.

Explanation:

You might be interested in
Accenture has put together a coalition of several ecosystem partners to implement the principles of blockchain and Multi-party S
Anika [276]

Answer:

They include;

1. MAAG Pump Systems,

2. Automatik Plastics Machinery,

3. Gala Industries,

4. Reduction Engineering Scheer,

5. Ettlinger Kunststoffmaschinen and

6. XanTec EDV- und Steuerungstechnik

Explanation:

The MAAG group consists of six companies specialized in different aspects of polymer production. They provide their services to petrochemical, pharmaceutical and food production companies. They produce pellets, gear pumps, filtration systems and components, pelletizers, etc.

They have more than 1000 staff and their offices are located in about 11 countries of the world.

5 0
3 years ago
When you merge business letters, how many total documents will you have when you are finished with the merge process?
dlinn [17]

Answer:

You will have one letter for every receiver on the table.

Explanation:

In a new Microsoft Word paper, click on the Mailings label, and in the Start Mail Merge collection, agree on Start Mail Merge.

Agree on Step-by-Step Mail Merge Wizard.

Choose your paper model.

Choose the opening paper.

Preferred beneficiaries.

Address the report and attach your custom entries.

6 0
3 years ago
Read 2 more answers
For which input values will the following loop not correctly compute the maximum of the values? 1. Scanner in = new Scanner (Sys
My name is Ann [436]

Answer:

The answer is "Option d".

Explanation:

Please find the complete question in the attached file.

8 0
3 years ago
2- There are many different design parameters that are important to a cache’s overall performance. Below are listed parameters f
katen-ka-za [31]

Answer:

1. 2588672 bits

2. 4308992 bits

3. The larger the data size of the cache, the larger the area of ​​memory you will need to "search" making the access time and performance slower than the a cache with a smaller data size.

Explanation:

1. Number of bits in the first cache

Using the formula: (2^index bits) * (valid bits + tag bits + (data bits * 2^offset bits))

total bits = 2^15 (1+14+(32*2^1)) = 2588672 bits

2. Number of bits in the Cache with 16 word blocks

Using the formula: (2^index bits) * (valid bits + tag bits + (data bits * 2^offset bits))

total bits = 2^13(1 +13+(32*2^4)) = 4308992 bits

3. Caches are used to help achieve good performance with slow main memories. However, due to architectural limitations of cache, larger data size of cache are not as effective than the smaller data size. A larger cache will have a lower miss rate and a higher delay. The larger the data size of the cache, the larger the area of ​​memory you will need to "search" making the access time and performance slower than the a cache with a smaller data size.

5 0
3 years ago
What describes Accenture's approach to automation?
Mrrafil [7]
<h2>Answer:</h2>

<h2>intelligence - centered</h2>

<h2>Explanation:</h2>

I hope it helps you

4 0
2 years ago
Other questions:
  • Which of the following is true of property?
    13·1 answer
  • Which of the following is a valid call for the generic method declared below? and why?
    9·2 answers
  • Explain the role of the domain name system
    15·1 answer
  • The purpose of the ________ element is to describe the contents of a table.
    15·1 answer
  • Which of the following is something that scientists often seek by using computer models and simulations?
    8·2 answers
  • When you copy text, the selected text is copied from the original location and placed on the
    9·1 answer
  • Can Microsoft Excel can use Headers and Footers, just like Microsoft Word
    9·1 answer
  • Jeremy wants to run a program file from the command prompt. Which of the following should Jeremy type in the command prompt wind
    8·2 answers
  • . Write a short program that asks the user to input a string, and then outputs the
    15·1 answer
  • What is the Cycle of Dependency?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!