1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bulgar [2K]
3 years ago
13

In your own words, describe how a network administrator can use the OSI model to isolate a network problem.

Computers and Technology
1 answer:
fenix001 [56]3 years ago
3 0

Answer:

 Network administrator use the open system interconnection model to isolate the network problem as, the network administrator can easily find the problem in the system.

Network administrator regularly depicts issues by the layer number and in many cases the network problem required the network administrator to isolate the issue in which layer the maximum number of issue occurred.

By using the OSI layer, we can easily add protocols to its higher to lower layers without any type of interruption.

You might be interested in
JavaScript
Mekhanik [1.2K]

Answer:

C. 40

Explanation:

The code uses IF and ELSE statements to carry execute a block of code if any of the statements hold true

OrderTotal here is greater than 100, and this allows the second IF ELSE block to be executed.

The code to be executed is discountAmount = OrderTotal * 0.2

This will be discountAmount = 200 *0.2

therefore, discountAmount = 40.

3 0
3 years ago
What can the tab key do
bulgar [2K]
Answer: it indents

Explanation:
8 0
2 years ago
* Create a list of places and situations in which we use a computer
Vinvika [58]

Answer:

Place:

Coffee shop. Railway Reservation System, Airport Reservation System, Machine learning and a long list follow.

Situation:

We find that there is a similar type of calculation and in bulk. Thus we can create a piece of software, and run that with the help of a computer to solve our problem of tackling the massive number of clients.

Description:

The situation demands a similar sort of calculation, and we can hence make a program or most favorably a software that can do all these calculations for us. A perfect example is a coffee shop, which has 100 to 1000 customers drinking coffee each second. And you can understand how badly they need a computer and software. This cannot be done manually.

Explanation:

Please check the answer section.

5 0
3 years ago
Write a Boolean expression that tests if the value stored in the variable num1 is equal to the value stored in the variable num2
Alenkinab [10]

Answer:

num1 = int(input("Enter value: "))

num2 = int(input("Enter value: "))

if num1 == num2:

   print("Equals.")

else:

   print("Unequal.")

Explanation:

6 0
2 years ago
Miriam Is a network administrator. A few employees want to access sensitive Information stored on a backup device. She wants to
mihalych1998 [28]

Answer:

C. user accounts

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list primarily is composed of a set of permissions and operations associated with a NTFS file such as full control, read only, write, read and execute and modify.

Generally, access control list are defined for specific user accounts and may either be an administrator, standard user or guest account.

In this scenario, Miriam a network administrator wants to give access rights to employees who are interested in accessing sensitive Information stored on a backup device. Thus, the option Miriam should use is user account.

7 0
2 years ago
Other questions:
  • Mark, David, Tia, and Ashley are team members in a computer programming class. They have been assigned the task of creating a co
    12·1 answer
  • Why is the answer A?
    6·1 answer
  • Similarites between hardware and software
    9·1 answer
  • Yall like portal 1 or 2
    8·1 answer
  • Before inserting a preformatted table of contents, what must you do first?
    8·1 answer
  • Answer this question for points lol
    7·2 answers
  • Why do we need operating systems?
    7·1 answer
  • If a movie, song, or book is offered for free, is it malware?
    15·1 answer
  • A(n) _____ is a computerized system by which subscribers are able to communicate to all other subscribers by sending a transmiss
    5·1 answer
  • 1. The letters that appear after the dot after a file name are called the:
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!