1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timama [110]
3 years ago
11

60 POINTS!! WILL MARK BRAINLEST!!

Computers and Technology
1 answer:
polet [3.4K]3 years ago
8 0

design of the network

security for the network

documentation

identifying and fixing issues

You might be interested in
Which of the following is an example of joint problem solving?
tatuchka [14]

Explanation:

There is a high degree of informality to these relationships, which are focused on information sharing, joint-problem solving and joint operations.

A hallmark of most of these processes is their informality, whether through information sharing, joint problem solving or joint operations.

Global joint problem-solving team. In addition to requesting a division of labour, the Global Task Team recommendations called upon the World Health Organization (WHO), UNICEF, the United Nations Population Fund (UNFPA), the United Nations Development Programme (UNDP), the World Bank, the UNAIDS Secretariat and the Global Fund to take the lead in and establish the joint United Nations system-Global Fund problem-solving team by July # in order to support efforts that address implementation bottlenecks at the country level

4 0
3 years ago
What type of network access control uses Active Directory to scan a device to verify that it is in compliance?
Komok [63]

Answer:

Agentless NAC

Explanation:

An active directory is a kind of storage service that holds data of objects like user credentials, resource location etc, for permission and network access authentication.

Network access control is a form of computer network security that integrates security technology like antivirus, intrusion detection and prevention systems etc to system authorisation and authentication processes to control access to a network.

An agentless network access control uses the active directory to scan devices to confirm its compliance to security policies.

3 0
4 years ago
Choose the answer.
Alik [6]
A home network aswell business networking would use a Router to connect the lam and internet all together
3 0
3 years ago
Read 2 more answers
Polymorphism means ______________.
Westkost [7]

Answer:

Polymorphism means that a variable of supertype can refer to a subtype object.

Explanation:

For example, in Python programming language, a function that accepts an iterable object uses the concept of polymorphism because that function can accept strings, lists, tuples as arguments.

5 0
3 years ago
Read 2 more answers
Which one bc im struggling
Setler79 [48]

Answer:

cant really see it

Explanation:

3 0
3 years ago
Other questions:
  • A brick weighs 26 N. Measured underwater, it weighs 11 N.
    10·1 answer
  • "To take advantage of these developments in the digital world, new approaches, concepts,instruments, and methods are needed, whi
    8·1 answer
  • In Microsoft Word, spelling errors are identified by a _____.
    5·2 answers
  • What is anatomy of software house?
    10·1 answer
  • Renee's creating a plan for her business's information system. What should she do after she determines the goals for her busines
    10·1 answer
  • The font color grid is located in the color group on the design tab. (points : 2) true false
    9·1 answer
  • Plz tell me how to get my deleted account back you will be highly PRAISED!!!!!!!!!!
    14·2 answers
  • How will you identify a file type on your computer?
    5·1 answer
  • Guys im getting the ps5 tomorrow :)​
    5·2 answers
  • What is meant by reflection?​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!