1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirill [66]
3 years ago
12

Dominick has been hired to design a network for Pirate Press. In a paragraph of no less than 125 words, discuss what he needs to

consider and know about the organization.
Computers and Technology
2 answers:
RideAnS [48]3 years ago
7 0

       In order for Dominick to adequately design a network for the company "Pirate Press," he will need to learn information about the company, to make a network that will accommodate their needs. First, he will need to ask the employees about what they wish to gain from a new network. He should also ask about their requirements for the network as well as what job they will be doing with this network. Second, he should ask the boss about the company and what this network should provide, as in what will the features be. He should ask about the number of employees that will be using the network, how many computers will be used regularly, and how they will need to share and download documents as well.

Luda [366]3 years ago
3 0
If Dominic is to design a network for Pirate Press he would have to consider and know of the following:
a. Growing capital - he needs to know if the company's sales is growing or is in debt so that he would know what course of action he could take in case he pursues projects for the company. 
b. People/Team - the people/team working are the heart and soul of any company and knowing their specific needs and how they work is key to knowing how the company works as one unit 
c. Marketing of the product - he needs to know how the product sells in order for him to decide what other strategies he can incorporate to make the product more marketable to people.

You might be interested in
You are called to assist in troubleshooting a network problem that has occurred soon after a significant IPv6 implementation. So
HACTEHA [7]

Answer:i dont kowe

Explanation:

5 0
3 years ago
Whose email address may the agent enter into the applicant information section of LEAN enrollment application
stich3 [128]

It is the customer's email address may be entered into the applicant information section of LEAN enrollment application

<h3>What is LEAN enrollment application?</h3>

LEAN enrollment application is a kind of electronic enrollment program which is specifically designed to make enrollments easier for agent

So therefore, It is the customer's email address which may be entered into the applicant information section of LEAN enrollment application

Learn more about enrollment application:

brainly.com/question/18186504

#SPJ1

6 0
2 years ago
Timothy is a multimedia designer. He needs to create a prototype of a new product that his firm is launching. Which multimedia s
mestny [16]

Explanation:

The answer is D. 3-f modeling

5 0
4 years ago
A user reports his or her computer is slow to boot. You check the boot order and determine that the computer is checking the C d
Nata [24]
You could turn off memory testing, but defragmentating and running chkdsk on C: would be better to try first.
6 0
3 years ago
As it relates to confidentiality, data may be classified in three ways. Match each data classification below to its definition.
Delicious77 [7]

Answer:

 According to the confidentiality, the data are classified into the three ways that is confidential, public and controlled and it the data classification are matched according to to its particular definition are as follows:

Confidential  = (C) Cannot be released without owner's consent.

Public = (A) Accessible to everyone

Controlled = (B) Not public but can be released without owner's consent

 The confidentiality of the data is basically known as protecting the data from the unauthorized and unlawful access. The data confidentiality is the set of the rules which limit the unauthorized access to the confidential information and it is only available to the authorized people with the reliable access to the data.

5 0
3 years ago
Other questions:
  • To include totals and other statistics at the bottom of a datasheet, click the ____ button on the HOME tab to include the Total
    12·1 answer
  • Match the terms related to the web with their explanations
    6·1 answer
  • Which of the following journals is not aimed at the public as well as scientists?
    7·1 answer
  • Some languages are traditional programming languages for developing applications; others, such as markup and scripting languages
    12·1 answer
  • Someone once observed that "the difference between roles and groups is that a user can shift into and out of roles, whereas that
    13·1 answer
  • The Electronic Communications Privacy Act requires an investigator to have a wiretap order to acquire ___________ information fr
    8·1 answer
  • In which situations would it be most helpful to filter a form? Check all that apply.
    8·1 answer
  • Hey i need some help with code.org practice. I was doing a code for finding the mean median and range. the code is supposed to b
    14·1 answer
  • Swapping Order of Vowels Write a program to swap the order of the vowels in a given word. For example, if the word is programmin
    10·1 answer
  • WHERE DO I GO TO DO THIS AND WHAT DO I WRITE?????
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!