1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zmey [24]
3 years ago
13

A network administrator for a small company is contemplating how to scale the network over the next three years to accommodate p

rojected growth. Which three types of information should be used to plan for network growth? (Choose three.)A. human resource policies and procedures for all employees in the companyB. documentation of the current physical and logical topologies *C. analysis of the network traffic based on protocols, applications, and services used on the network*D. history and mission statement of the companyE. inventory of the devices that are currently used on the network*F. listing of the current employees and their role in the company
Computers and Technology
1 answer:
choli [55]3 years ago
4 0

Answer:

Option B,C,E

Explanation:

You might be interested in
What are the requirements of a data dictionary ?
rodikova [14]
While these are the core elements of a data dictionary, it's not uncommon to document additional information about each element, which may include the source of the information, the table or concept in which the attribute is contained, the physical database field name, the field length, and any default values.
8 0
3 years ago
Read 2 more answers
"What technology will examine the current state of a network device before allowing it can to connect to the network and force a
EleoNora [17]

Answer: A. Network Access Control (NAC)

Explanation:

The CORRECT answer is (A.) <em>Network Access Control (NAC)</em>. NAC refers to an method used in computer protection in which aspects such as antivirus, or host intrusion prevention among others are somehow consolidated in order to unify endpoint security. Such an approach allows the system authentication to enforce network security.

7 0
3 years ago
this weekend you areplanning to complete part of your assignment at the library to do this you need to store data on a removable
Archy [21]
A flash drive, it can be put into a USB port and the computer will register it and you should be able to pull up anything you store on it on a another computer or device you are using.

4 0
3 years ago
Which type of drawer has three dispensing modes: single-dose, multi-dose, and matrix?
ad-work [718]

Answer:

CUBIE MiniDrawer Bin

Explanation:

MiniDrawers comes in two configurations, and each fitting comes in one drawerslot. The MiniDrawer (1-6) comes with the most primary pocket dimensions. And we have the 18-tray MiniDrawer (1-8) comes with another dimensions in its basic form. You will in fact find various pocket dimensions like 1,2,3,4,6,12, and these comes within the 18-tray and 6-tray MiniDrawers. And they come in all the dispensing modes mentioned in the question. Hence, the above answer. The answer is clear from the options as well, and since it has the matrix mode as well apart from single dose mode and multi dose mode.

6 0
3 years ago
Why are open standards important in the data communications industry?
IrinaK [193]

They enable interoperability between software and hardware from different vendors.

5 0
3 years ago
Other questions:
  • What might the purpose be for a sata-style power connector on a motherboard?
    15·1 answer
  • True or false the primary advantage of the worksheet is the ability to solve numerical problems quickly and accurately
    11·1 answer
  • If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appr
    14·1 answer
  • Select
    14·1 answer
  • Brake fluid should be checked __________.
    8·2 answers
  • Select the education and qualifications that are most helpful for business analysis careers. Check all that apply
    11·2 answers
  • What is a geam in the ggplot2 system?
    5·1 answer
  • Please help it’s timed
    13·1 answer
  • Computer Hardware can consist of a
    13·1 answer
  • Explain the concepts of GIGO—garbage in, garbage out. Why do you think it’s a helpful concept in coding? How do you think it can
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!