1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Allushta [10]
3 years ago
8

What does network administration normally include? Check all of the boxes that apply.

Computers and Technology
1 answer:
Paul [167]3 years ago
8 0

Answer: design of the network

security for the network

documentation

identifying and fixing issues

Explanation: I just took the test

You might be interested in
When you sustain program implementation by staying true to the original design, it is termed A. Goals and objectives B. Program
Naya [18.7K]

Answer:

Program fidelity

Explanation:

7 0
3 years ago
Please answer this question​
RSB [31]

Answer:

what is the other language

is it Assamese clarify me in the comment section bro

4 0
3 years ago
The Research and Development Process has five steps what are they ?
valentina_108 [34]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

There are five steps used in any research and development project.

Step 1 – Locating and Defining Issues or Problems and get an idea about what is needed

Step 2 – Designing the Research Project, How you will solve the problem or get the solution of the problem

Step 3 – Collecting Data.

Step 4 – Interpreting Research Data.  

Step 5 – Report Research Findings.

3 0
3 years ago
CODING TIME
Fynjy0 [20]

Answer:

food_list = ['rice', 'beans','yam', 'bread', 'pasta', 'cocoa','tea']

one_more = ['meat']

extend_list = food_list + one_more

print(extend_list)

Output : ['rice', 'beans','yam', 'bread', 'pasta', 'cocoa','tea', 'meat']

food_list.append('milk')

print(food_list)

Output : ['rice', 'beans','yam', 'bread', 'pasta', 'cocoa','tea', 'milk']

food_list.insert(0, 'cake')

print(food_list)

Output : ['cake', 'rice', 'beans','yam', 'bread', 'pasta', 'cocoa','tea']

flowers = ['rose', 'hibiscus', 'lily']

flowers.remove('rose')

print(flowers)

Output : ['hibiscus', 'lily']

To remove rose using pop()

flowers.pop(0)

Explanation:

The + operator and append method adds elements to the end of an existing list item.

The insert method adds element at the specified index

Remove method deletes element by stating the name of the element to be deleted while pop deletes element using the index value of the element.

7 0
2 years ago
Suppose there are 10 computers on a network that are configured to share a few printers and a single document folder. The compan
ivanzaharov [21]

Answer:

B- Workgroup model

Explanation:

A workgroup model can be defined as a process which enables system to be peer together in order to access the resources shared like files and printers at the same time.

In work group microsoft operating systems tend to share files, printers, and even Internet connection among them which is why work group is important especially in a place in which their are various computers with limited files and printer or internet connection.

4 0
3 years ago
Other questions:
  • ________ is a password-cracking method wherein the attacker compares passwords to lists of common words.
    12·1 answer
  • Which steps would you take to determine how much an employee should be paid? Select all that apply.
    9·1 answer
  • what is the gpa(grade point average) you need to have or you get kicked out of robotics for middle school?
    7·2 answers
  • The _____ class can be used to get user input using dialog boxes.
    14·1 answer
  • ___________ is a task pane used to correct grammar errors; opens when you click the Spelling & Grammar button in the Proofin
    15·2 answers
  • What critical-thinking tool is being used when asking the question, Is this information specific enough?
    9·1 answer
  • Can someone please help me I need to turn this in my 3:00pm Eastern time
    12·1 answer
  • Choose the correct term to complete the sentence.
    10·1 answer
  • Name 3 things that you use daily that are considered computers?
    6·1 answer
  • Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and ins
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!