1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksivusya [100]
3 years ago
10

In needs analysis: Group of answer choices the costs of different physical network design alternatives are assessed the rate of

growth of network traffic is not an issue a baseline of current operations is not important the geographic scope is not an important consideration the goal is to understand what users and applications the network will support
Computers and Technology
1 answer:
Ludmilka [50]3 years ago
5 0

Answer:

the goal is to understand what users and applications the network will support.

Explanation:

A traditional network design approach is said to follow the structured systems of analysis as well design process that is similar to that which is used in building such applications. The main goal of the application developers is understand and study the needs of the users and also the application which the network will support.

You might be interested in
How does a spreadsheet affect a column of numerals when it sorts the column
maria [59]

Explanation/Answer:

Data can be put into more than one cell (Excel), which should be an important key to your answer. In SEVERAL CELLS AT THE SAME TIME or more. The data can be entered in dates, text, times, or numbers. Formatting the data can be done in a possibility of ways.

6 0
3 years ago
Read 2 more answers
Currently, this program will add 6 and 3 together, output the math problem and output the answer. Edit this code so that a rando
Yakvenalex [24]

I've included my code in the picture below. Best of luck.

6 0
3 years ago
Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames
aksik [14]

Answer: (B) An insider

Explanation:

 According to the question, an Angela is an insider as she maintain all the sensitive and confidential information of the customer like the password, username,SSN (Social security number) and the personal information.

Angela and her co-worker has the right for using the customer sensitive information and data. An insider is the person who keeps all the sensitive information of the organization or company.

5 0
3 years ago
HELP ASAP!Select all examples of desirable workplace skills, habits, and attitudes.
ddd [48]

Answer:

does not call in sick or miss work frequently

creates a list of solutions for the boss

arrives at work on time or early

waits for supervisor to give directions

works quickly and accurately

shows initiative

communicates effectively

sets clear goals to achieve success

Explanation:

Have a Great Day!!!

7 0
3 years ago
1. A teacher asked a student to capture and print out a one-slide presentation using MSWord,       showing everything on the scr
Drupady [299]

The keyboard combinations that can be used to capture and print out a one-slide presentation using MSWord, showing everything on the screen is Function key + PrtScr

<h3>What is a Key Combination?</h3>

This refers to the procedure that is used to combine two or more keys on the keyboard to execute a task.

Hence, we can see that the procedure that can be used to carry out the operation is:

  • Enter the screen you want to capture and print
  • Press the Function key, followed by the PrtScr. Please note this can vary slightly, depending on the keyboard.

The hardware devices that would be needed to be set up by the system analyst at a computer laboratory are:

  • System Unit
  • Laptops/Monitor
  • Power adapters
  • Ethernet cables, etc

The database applications that can be recommended by the system analyst are:

  • MySQL,
  • SQL Server

The five word processing packages that are likely to be installed are:

  • G00..gle Docs
  • MsWord
  • MSOffice
  • Dropbox Paper
  • Corel WordPerfect

Read more about word processing here:

brainly.com/question/985406

#SPJ1

6 0
2 years ago
Other questions:
  • Part 3a. Largest power of two less than (10 pts) Implement the method public static int largestPow2LessThan(int n) which calcula
    5·1 answer
  • Many malware attacks are ____ attacks, which involve more than one type of malware and/or more than one type of transmission met
    6·1 answer
  • What do you call the process of translating statements written by a developer? What is the result of this process?
    6·1 answer
  • With _______, applications are owned, delivered and managed remotely by one or more providers over the Internet or an intranet,
    15·1 answer
  • If I dribbled on my motherboard and I used windex to clean off the spit would it still work ?
    11·2 answers
  • Describe the process of normalization and why it is needed.
    12·1 answer
  • Graphic software task​
    7·1 answer
  • Help me asap please
    15·1 answer
  • What are your strongest competencies? What will you do them? <br>❌NONSENSE ANSWER<br>​
    9·1 answer
  • Why womt this code work????
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!