1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enot [183]
3 years ago
6

What factors do network consultants consider when determining the network needs of a business? Use the space provided below to a

nswer this question in five to ten sentences.
Computers and Technology
1 answer:
ludmilkaskok [199]3 years ago
7 0

Answer:

1.<u>Support</u>

In most cases, the simpler the network design, the less technical support you'll require for both installation and maintenance. If you need a complex, high-speed network, consider the level of technical assistance available locally. Many small businesses can't justify the cost of full-time IT personnel. Designing a simple network that can be serviced quickly by local technicians should be a primary consideration. If your business demands a complex network beyond the capabilities of local service, design sufficient redundancy in critical network elements to ensure a minimum level of service until repairs can be made.

2.<u>Expansion</u>

Planning for growth in the initial stages can save future expenditures. The price difference, for example, between a 16-port switch and a 32-port switch can be negligible when compared to the cost of purchasing an new switch to replace one that is too small. Most network devices are designed to provide several years of service.

3.<u>Outside Access</u>

Internet access has become all but mandatory for most modern businesses. It's a good idea to consider the type of Internet connection required and the amount and type of support you will receive from your Internet service provider before designing the rest of your network. Some ISPs will provide support and advice on connection speed requirements and security concerns for commercial accounts before installation.

4.<u>Security</u>

Securing a network from outside intrusion or data theft is a primary concern for many companies. While it is possible to eliminate the expense of Ethernet cabling by opting for a wireless network solution, Wi-Fi networking is the least secure method of sharing data and connections. The encryption methods built into most commercial routers, Wireless Encryption Protocol (WEP), Wireless Protected Access (WPA) and the more recent WPA2, can be cracked by skilled hackers. Designing a network with hard-wired Ethernet connections eliminates the risk of intrusion to only those with physical access to the network.

5.<u>Cost</u>

Equipment and maintenance costs are often the first consideration in network design. Fortunately, the cost of hubs, routers and switches are relatively low when compared to the early days of networking.

You might be interested in
Which UML relationships should be used between a subclass and a superclass? For example, suppose there is an interface or abstra
victus00 [196]

Answer:

C. Generalization

Explanation:

The relationship between subclass and superclass is generalization. For example there will be generalization between the class Employee and class HourlyEmployee which inherits from it. All the other options are not suitable.

8 0
3 years ago
Which of the following is not a language commonly used for web programming?
DerKrebs [107]
The answer would be Assembly language as assembly language is not used for web development, but rather is a low level programming language.

Please mark branliest if this helped!!
7 0
3 years ago
Read 2 more answers
A written guarantee to fix or replace an item is called a _____.
VladimirAG [237]
A warranty is a statement given by the manufacturer or other company
3 0
3 years ago
Read 2 more answers
Simplify the Boolean expression (AB(C + BD) + AB]CD.
finlep [7]

Explanation:

Simplify the Boolean expression (AB(C + BD) + AB]CD.

6 0
3 years ago
Read 2 more answers
What are 3 things that can make cyberbullying especially harmful​
motikmotik

Answer:

Anxiousness and depression

Suicidal Thoughts

Anger

Explanation:

Three major side affects of cyber bullying are

  1. Anxiousness and depression
  2. Suicidal Thoughts
  3. Anger

Anxiousness and depression

Cyber bullying takes away self esteem and self confidence.Lack of self esteem makes person to feel bad about him/her self and lack of confidence makes taking daily life decision very difficult which all adds up to stress

Anger

Some people might feel powerless while others strike back on the bullies in anger.Unchecked anger can be very dangerous.Burning in the flames of anger a person will plot revenge and can go to any means for this. This starts a never ending bully-victim cycle

Suicidal Thoughts

Depression if not cured can lead to suicidal thoughts. When a person is felling low and have no self confidence death seems an easy way out.

3 0
3 years ago
Other questions:
  • Ted is a fashion designer. Where is he most likely to work
    9·1 answer
  • Do most facebook and twitter users access the platform from their personal computers?
    6·2 answers
  • Sanjay is giving a slideshow presentation on his entire college class and he is feeling quite nervous in order to share his pres
    9·1 answer
  • "Create a Python program named detect_column_level_data_entry_errors. When complete, you will run this program to produce a diag
    11·1 answer
  • FREE POINTS JUST ANSWER MY LATEST TWO QUESTIONS PLEASE
    10·2 answers
  • Drag each label to the correct location on the image List the do’s and don’ts of safeguarding your password.
    14·1 answer
  • A program uses two classes: dog and poodle. which class is the base class and which is the derived class?
    7·2 answers
  • The executive ________ is the person ultimately responsible to their company for the project's success.
    13·1 answer
  • In Scheme, the form (symbol-length? 'James) will return: Group of answer choices 0 5 6 error message
    11·1 answer
  • What feature is available to add a auggestion in the margin of someone else's document.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!