1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xenn [34]
3 years ago
9

HURRY IM TIMED Note that common skills are listed toward the top, and less common skills are listed toward the bottom. According

to O*NET, what are common skills needed by Architects? Check all that apply. complex problem solving installation repairing active listening critical thinking speaking
Computers and Technology
2 answers:
Debora [2.8K]3 years ago
5 0

Answer:

1, 4, 5, 6

Explanation:

Sloan [31]3 years ago
4 0

Answer:

1 and 3 are the answers

You might be interested in
When computer users have trouble with their machines or software, Roland is the first person they call for help. Roland helps us
Schach [20]

Answer:

The correct answer is A) Support Analyst

Explanation:

From the question, we can see that Roland is familiar with both machines and software. He is familiar with the operations of both parts of a computer to the end that he can attempt a fix. And if he can't he knows who to refer the end-users to. Usually, some IT personnel that is more experienced.

From the above points, we can safely say that Roland is an IT Support Analyst. He cannot be the Systems analyst because Systems Analysts are usually at the top of the Pyramid. They take on problems that are referred upwards to them from support analysts.

Cheers

3 0
2 years ago
Which is the best description of a computer virus?
MatroZZZ [7]
The best description of a computer virus is. Someone first starts out making a malicious program, then can send it to a unexpected user. After that, when the user opens the malicious program, it can do negative things on the target. The virus first starts out in the system32, then infects a random file type for example, exe files, or dlls etc. Then random errors can pop up on the computer saying "YOUR COMPUTER IS UNDER RISK! CALL THIS NUMBER NOW! 555-555-5555" and the options of the error, can direct you to a website, that can give you another virus. To get rid of a virus, you have to ignore the popups that comes onto your computer, and get a strong antivirus like avast, or avg. Then let it scan the system. After when the scan is done, it will show up the virus, and it will give you options "to delete virus or ignore it" you would hit delete. I hope this answer helped you. Let me know if you have any more questions! Thanks!
6 0
3 years ago
Read 2 more answers
You have been asked to decouple an application by utilizing SQS. The application dictates that messages on the queue can be deli
LuckyWell [14K]

Answer:

Option B is the correct option.

Explanation:

When using SQS the user request to separate a query. The specification specifies that updates on the list may have been transmitted multiple times, but it must be transmitted throughout the sequence in which they appeared, and therefore should require secure, repetitive queue polling.

So, They configure a First In First Out SQS queue and allow long-polling which is suitable for AWS services.

8 0
3 years ago
How is all data stored on a computer?
Maru [420]

Answer:

All data in a computer is stored as a number. Binary data is primarily stored on the hard disk drive (HDD). The device is made up of a spinning disk (or disks) with magnetic coatings and heads that can both read and write information in the form of magnetic patterns.

Explanation:

Please mark me as brainilest if you don't mind and have a wonderful day!! :D

4 0
2 years ago
Read 2 more answers
Martina is responsible for the installation and maintenance of both hardware and software that make up her company’s network. Sh
natali 33 [55]

Answer:

The answer is "network administrator"

Explanation:

A network manager is liable for the deployment, maintenance, and upgrade to any software or hardware required to operate a computer system effectively, In this post, Martina works as follows:  

  • She can be extended into a local area, wide area network, the network and web services via the IT or device network.
  • She addresses issues that occur in everyday usage and work on long-term initiatives like as information backup or network maintenance.
5 0
3 years ago
Other questions:
  • Capacity requirements are computed by multiplying the number of units scheduled for production at a work center by the:
    14·1 answer
  • When inserting a fly in animation what is the first step in the process?
    9·1 answer
  • How long does it take to get your alignment fixed?
    6·1 answer
  • A(n ____ is anything about which data are to be collected and stored.
    8·1 answer
  • write a program that asks the user to enter a positive integer, then prints a list of all positive integers that divide that num
    6·1 answer
  • Develop a list of privacy protection features that should be present if a website is serious about protecting privacy. Then, vis
    8·1 answer
  • Search the Web for three different employee hiring and termination policies. Review each and look carefully for inconsistencies.
    5·1 answer
  • Given positive integer n, write a for loop that outputs the even numbers from n down to 0. If n is odd, start with the next lowe
    8·1 answer
  • You are working with a database table that contains data about music. The table includes columns for track_id, track_name (name
    10·1 answer
  • The SQL SELECT built-in function COUNT ____.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!