1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zmey [24]
3 years ago
13

A network administrator for a small company is contemplating how to scale the network over the next three years to accommodate p

rojected growth. Which three types of information should be used to plan for network growth? (Choose three.)A. human resource policies and procedures for all employees in the companyB. documentation of the current physical and logical topologies *C. analysis of the network traffic based on protocols, applications, and services used on the network*D. history and mission statement of the companyE. inventory of the devices that are currently used on the network*F. listing of the current employees and their role in the company
Computers and Technology
1 answer:
choli [55]3 years ago
4 0

Answer:

Option B,C,E

Explanation:

You might be interested in
Type your response in the box. Imagine you purchased a new computer and you plan to install one operating system and a few appli
faltersainse [42]

Answer:

Yes

Explanation:

As long as they were legally copied

5 0
2 years ago
Read 2 more answers
Write a program that keeps taking integers until the user enters in python
soldi70 [24.7K]

int main {

//variables

unsigned long num = 0;

std::string phrase = " Please enter your name for confirmation: " ;

std::string name;

//codes

std::cout << phrase;

std::cin>> name;

while ( serial.available() == 0 ) {

num++;

};

if ( serial.avaliable() > 0 ) {

std::cout << " Thank you for your confirmation ";

};

};

3 0
3 years ago
write the class definition of a subclass of square called fancysquare that has a method called getdiagonal. the getdiagonal meth
Harman [31]

Answer:x squared

Explanation:

3 0
3 years ago
Which is an example of oversharing using GPS?
sergij07 [2.7K]
I believe it is D


Social media networks make it easy to help share what’s going on in your life. The problem is when the wrong people get hold of that information. Criminals are smart. They’re connected, and they know how to use the Internet to their advantage. Stalking a victim, getting to know their routines and the times they’re home (and when they’re not) is as easy as opening a web browser and checking an open account. This excellent infographic from Credit Sesame helps illustrate exactly how your social media info can be misused. Last week, Cult of Mac ran a story that went viral about an app called Girls Around Me which aggregated public profiles of women in an area. Everything from check-ins, status updates, profiles and photo albums were aggregated for app users to see. As a result of the article, Foursquare has since revoked the app’s API access, disabling many of the app’s features. Scary stuff. While the app is hopefully mothballed, it highlighted a lot of security risks that are associated with being on social media. The safest option is to simply not use social media. But I’ll be honest: I can’t imagine deleting my social profile. Luckily, you don’t have to. Being vigilant about safeguarding your profile – and being selective about what you share and who you share it with – can help reduce the risk of using social media.


If you need more info LMK. If this is incorrect please comment that it is, along with the correct answer so I can figure out my error, have a great day TPWK
7 0
3 years ago
Read 2 more answers
What is the purpose of entering the command ip nat inside source static tcp 192.168.10.2 80 209.165.200.223 8080 at the global c
vlabodo [156]

Answer: See below.

Explanation: It binds the inside local address and local port to the specified inside global address and global port.

7 0
2 years ago
Other questions:
  • Instructions:Select the correct answer.
    15·2 answers
  • How many electrons are there in an atom of carbon? A. Four B. Eight C. Six D. One
    15·2 answers
  • In general, WAN-specific standards identify specific security requirements for WAN devices. For example, the ___________________
    10·1 answer
  • What is the best way to improve the following code fragment? if ((counter % 10) == 0) { System.out.println("Counter is divisible
    13·1 answer
  • How do you represent the decimal integer 50 in binary?
    14·1 answer
  • In a penetration test, a ________ team consists of IT staff who defend against the penetration testers. They are generally aware
    14·1 answer
  • Consider a hard disk with the following specifications :<br> 3.5 in diameter
    11·1 answer
  • Help Me<br><br> What are the four types of graphic models?
    10·1 answer
  • Write a pseudocode to add the first 100 even numbers.
    11·1 answer
  • Data files whose records are always retrieved in sequence from the beginning of the file are known as
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!