1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivan
3 years ago
8

You are a network administrator responsible for all network platforms and services. The company wishes to use a hosted service t

o provide writing samples to all clients. What network management requirement(s) should be addressed before the service is acquired and why? Explain in detail.
Computers and Technology
1 answer:
Otrada [13]3 years ago
5 0

Answer:

The network management requirements before the srvice is provided are as follows:

NMS policies need to be followed that would define what all data's to be collected and in what way.So as to monitor and manage the network,regular network discovery should be made and scanning should be made in order to identify the network connected devices.End of life policy to be followed with track maintanance aggreements.Network Change and Configuration Management configuration changes are to be made.Interface statistics is to be followed and made.Spanning tree protocol changes,router redundancy protocol and broadcase storm detection protocols need to be implemented.

You might be interested in
Explain the steps you take to complete an Internet search. Do you use a particular search engine every time or do you alternate?
Naddik [55]
1. Personally, I always use the same search engine, which is Google. I once opened Bing mistakenly, but obviously returned to Google immediately. Google is my preferred choice because I've used it for such a long time that I've gotten so used to it and cannot change it. The other search engines don't look as appealing to me as Google.

2. Some advantages would be definitely the format of the information you get from a search engine as opposed to the metasearch engine - sometimes, the metasearch engine cannot provide you with complete results or even complete sentences, so you may be left with illegible texts. On the other hand, metasearch engines can give you so much more information than regular search engines.

3. If the credentials seem legit, based on particular rules as to how to write sources used (such as Chicago style, APA, etc.), then you can safely assume the source is credible. If the author wrote everything necessary in his text (especially works cited/links available), you can usually trust that source.
5 0
3 years ago
PLEASE HELP 17 POINTS AND ILL MARK BRAINLIEST IF CORRECT , DONT GUESS
Lorico [155]

Answer:

A is the only answer that makes sense, although it is explained very poorly.

6 0
3 years ago
The labor market shows the:
Bad White [126]
<span>The labor market shows the </span><span>supply of available workers in relation to available work. The labor market is made up of </span>people who are working or looking for work. Those who are actively searching for work are calculated in the labor market as well. Those who are able to work but are not searching for work are not part of the labor market. 
8 0
3 years ago
Zenmap's topology tab displays a __________ that shows the relative size and connection type of all discovered ip hosts.
VladimirAG [237]
<span>Zenmap's topology tab displays a "Bubble Chart" that shows the relative size and connection type of all discovered IP hosts.
</span>A kind of chart which shows three dimensional data is known as Bubble chart. It also can be seen as the variation of scatter plot where bubbles replace the data points.
4 0
3 years ago
What is a number system, and what is the total number of digits used in this system called?
DENIUS [597]
The number system is what is use globally as are way of counting the total number of digits is 9 because you can make any number with characters 1-9
7 0
3 years ago
Other questions:
  • What computer would be good for editing and streaming for less than 600$?
    7·1 answer
  • Where does cable termination occur in most buildings?
    9·1 answer
  • Which of the following must be included in the disaster recovery plan? Select one: a. Business functions b. Critical support fun
    12·1 answer
  • A plaintiff can bring a claim for intentional infliction of emotional distress when all but which of the following takes place:
    9·2 answers
  • Help fast pls will mark brainliest - What model is best to use for large complex accounting software that can be broken down int
    6·1 answer
  • An image can be copied from the Internet or another location and pasted into Paint.
    13·1 answer
  • Which encryption standard goes with the WPA2 protocol?<br> AES<br> DES<br> TKIP<br> WPS
    15·1 answer
  • Use the drop-down menus to complete statements about options for inserting video files.
    15·1 answer
  • Pls help me Pls help me
    13·1 answer
  • Question 3 of 10
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!