1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yulyashka [42]
3 years ago
14

Travis just got promoted to network administrator after the previous administrator left rather abruptly. There are three new hir

es that need onboarding with user accounts. When Travis looks at all the existing account names, he notices there is no common naming system. Where should he look to try to give the new hires user accounts with proper naming conventions
Computers and Technology
1 answer:
anastassius [24]3 years ago
7 0

Answer:

The company's account policy

Explanation:

If there's no common naming system, It's best to go with the company's account policy.

You might be interested in
The array index can be any nonnegative integer less than the array size.
suter [353]
I think the answer is true
7 0
3 years ago
A __________ acts as separate network that rests outside the secure network perimeter so untrusted users can access web servers
pychu [463]
Firewall
Dont forget to thanks and give brianliest.
4 0
4 years ago
How do you get a code in C to count down from 5??
Valentin [98]

Answer:

This is what the code should do:

“Lift off in T minus

5

4

3

2

1

Blast-off!”

When I run it, it just keeps printing ''Sum = 5'' forever.

Explanation:

Code:

int main(void) {

int sum = 5;  

int i;      

printf("Lift off in T minus\n");

for (i = 0; i < 5; i=i+i) {

   sum = sum - i;  

   printf("sum = %d\n",sum);  

}  

printf("Blast-off",sum);  

return 0;

5 0
4 years ago
#5 Multiple Select Which of the following describes a hardware error? Select 3 options.
DENIUS [597]

Answer:

A, E

Explanation:

Hope this is correct

7 0
3 years ago
Read 2 more answers
What are two key elements of describing the environment?​ a. ​ Communication protocols and security methods b. ​ External system
pashok25 [27]

Answer:

B. External systems and technology architecture.

Explanation:

In such environment, you have to know what external systems are in place so have proper communication with External Systems whether be in message format or web/networks, Communication protocols, Security methods, Error detection and recovery,

Additionally, it consits of technology architecture so conforming to an existing technology architecture helps us discover and describe existing architecture

3 0
3 years ago
Other questions:
  • An employee who interacts with customers regarding the nature of their car problems, rather than actually working on the vehicle
    12·2 answers
  • Playstation network live updates pes 2018 does it cost extra
    13·1 answer
  • Page UND
    8·1 answer
  • . Write a short program that asks the user to input a string, and then outputs the
    15·1 answer
  • Irene wants to connect your smart phone wirelessly to her laptop in order to transfer images. which two images could she reasona
    15·1 answer
  • The advancements in which of the following technologies has most changed the American job market in recent years?
    14·2 answers
  • Write a program to Test if mold is stored in the variable word.
    5·1 answer
  • Selection Sort List the resulting array after each iteration of the outer loop of the selection sort algorithm. Indicate the num
    10·1 answer
  • What online resource would you use if you wanted to read a review about a new movie?
    8·1 answer
  • As a technical support rep, michael is responding to a customer's question sent to him via e-mail. what should michael's first t
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!