1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirill [66]
3 years ago
12

Dominick has been hired to design a network for Pirate Press. In a paragraph of no less than 125 words, discuss what he needs to

consider and know about the organization.
Computers and Technology
2 answers:
RideAnS [48]3 years ago
7 0

       In order for Dominick to adequately design a network for the company "Pirate Press," he will need to learn information about the company, to make a network that will accommodate their needs. First, he will need to ask the employees about what they wish to gain from a new network. He should also ask about their requirements for the network as well as what job they will be doing with this network. Second, he should ask the boss about the company and what this network should provide, as in what will the features be. He should ask about the number of employees that will be using the network, how many computers will be used regularly, and how they will need to share and download documents as well.

Luda [366]3 years ago
3 0
If Dominic is to design a network for Pirate Press he would have to consider and know of the following:
a. Growing capital - he needs to know if the company's sales is growing or is in debt so that he would know what course of action he could take in case he pursues projects for the company. 
b. People/Team - the people/team working are the heart and soul of any company and knowing their specific needs and how they work is key to knowing how the company works as one unit 
c. Marketing of the product - he needs to know how the product sells in order for him to decide what other strategies he can incorporate to make the product more marketable to people.

You might be interested in
Read the four detective reports and the combined affidavit and warrant for the M57 Patents case. Write a one- to two-page paper
Fantom [35]

Answer:The 2009-M57-Patents scenario tracks the first four weeks of corporate history of the M57 Patents company. The company started operation on Friday, November 13th, 2009, and ceased operation on Saturday, December 12, 2009. As might be imagined in the business of outsourced patent searching, lots of other activities were going on at M57-Patents.

Two ways of working the scenario are as a disk forensics exercise (students are provided with disk images of all the systems as they were on the last day) and as a network forensics exercise (students are provided with all of the packets in and out of the corporate network). The scenario data can also be used to support computer forensics research, as the hard drive of each computer and each computer’s memory were imaged every day.

Explanation:

4 0
3 years ago
All of the following are incentives proprietary schools use to attract a student except
IRISSAK [1]
Idk what the answer choices are
4 0
3 years ago
Read 2 more answers
show how one version of the technology is an improvement over a previous iteration of that same technology
Romashka-Z-Leto [24]
This question has a ton of answers to it but, here are some basic ideas to help you out
- Cars 1900's vs today
- Computers 1980's vs today
- Guns 1800's vs today
- Televisions 1900's vs today
- Telescopes/Microscopes
7 0
3 years ago
The excessive use of the internet and the web for personal use at work is sometimes called ____ .
Elodia [21]
This is called Cyberslacking
7 0
3 years ago
Read 2 more answers
Most of the Desktop games contain a backdoor used to test and update the game.
sveta [45]

A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device (e.g. a home router), or its embodiment (e.g. part of a cryptosystem, algorithm, chipset, or even a "homunculus computer" —a tiny computer-within-a-computer such as that found in Intel's AMT technology).Backdoors are most often used for securing remote access to a computer, or obtaining access to plaintext in cryptographic systems. From there it may be used to gain access to privileged information like passwords, corrupt or delete data on hard drives, or transfer information within autoschediastic networks.

the answer is True

i hope it will help you

8 0
3 years ago
Other questions:
  • Which of the following is a goal of paraphrasing and summarizing?
    14·2 answers
  • Sam wanted to open a file that he saved yesterday. Which component inside the computer stores this file? the hard drive the fax
    13·2 answers
  • The Modified Greiss chemical test is used to detect the presence of what chemicals that indicate muzzle to target distance?
    11·1 answer
  • Camera shock might happen if you do which of the following to your camera?
    6·2 answers
  • In the ____________________ technique, the virus is divided into several parts and the parts are placed at random positions thro
    7·1 answer
  • Any kind of brances in science
    13·1 answer
  • Ssssssssssssssssssssssssssssssssssssssssssssssssss 100 points for this answer too.
    10·1 answer
  • Why is it important for organizations to make strong commitment to Cloud at scale?
    14·1 answer
  • a cloud access security broker (casb) provides protection across 4 areas/pillars: visibility to detect all cloud services, data
    15·1 answer
  • in a small town, there are two providers of broadband internet access: a cable company and the phone company. the internet acces
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!