1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
makkiz [27]
4 years ago
14

LAN security policies center on issues concerning connectivity; this includes determining how devices adhere to the network. Amo

ng the types of LAN control standards are _______________, which creates the schedules on LAN-attached devices for scheduled preventative and consistent maintenance, and ________________, which explains the change control management process for soliciting changes, granting changes, and implementing changes on the network
Computers and Technology
1 answer:
ANTONII [103]4 years ago
4 0

Answer:

<h2> Controlled maintenance and  configuration change control.</h2>

Explanation:

Among the types of LAN control standards are <em><u>controlled maintenance,  </u></em>which creates the schedules on LAN- attached devices for scheduled preventtative and consisten maintenance, and  <em><u>configuration change control.</u></em>

You might be interested in
You just bought a new hard drive for your computer to replace your primary hard drive. After backing your data up and, then, ins
Fofino [41]


It manages the soft and hardware resources of the system. It also provides a stable, consistent way for applications to deal with the hardware without knowing all of the details of the hardware

8 0
3 years ago
Read 2 more answers
What are some recent inventions that have improved the quality of your life?
Eva8 [605]
Phones, they help me with school work and provide entertainment.
4 0
3 years ago
Writea SELECT statement that uses the ranking functions to rank products by the total quantity sold. Returnthese columns:The pro
Nataliya [291]

Answer:

SELECT  product_name, SUM(DISTINCT quantity) AS total_quantity

RANK() OVER (PARTITION BY total_quantity ORDER BY product_name) AS rank,

DENSE_RANK () OVER (ORDER BY quantity DESC) AS dense_rank

FROM Order_items

JOIN products ON Order_items.product_id = products.product_id

GROUP BY product_id

Explanation:

The SQL query returns four columns namely, product name, total quantity, rank and dense rank. The query uses the rank and the dense rank function to return the rows according to numeric ranks.

5 0
3 years ago
Match these items. 1 . Naturalization Act stated that a foreigner had to live in the United States fourteen years to become a ci
Romashka-Z-Leto [24]

Answer and Explanation:

1. Naturalization Act:

  • Expressed that an outsider needed to live in the United States fourteen years to turn into a native.

2. Judiciary Act:

  • It was an effort to save Federalist standards

3. Sedition Act:

  • Approved fines up to $5,000 and detainment for ruining the legislature.

4. Alien Act:

  • Allowed the President to oust aliens or outsiders whom he judged "risky"

5. Alien and Sedition Acts:

  • Constrained through Congress by the Federalists.

6. Alien Enemies Act:

  • Allowed the President to detain or extradite hazardous outsiders or aliens in time of war
8 0
3 years ago
What folder is used to store offline files and folders managed by the offline files utility?
galina1969 [7]
<span>Offline files are stored in [systemdrive]:\windows\csc folder by default</span>
4 0
3 years ago
Other questions:
  • What statement needs to be included below to retrieve all rows from the Invoices table with InvoiceTotal greater than 100?
    9·1 answer
  • Websites often request information about you. You have a choice as to whether or not you provide this to them. What aspect of PA
    12·1 answer
  • Interactive media professionals are unique among other Information Technology professionals because they
    7·1 answer
  • Good afternoon guys !!!
    14·2 answers
  • Before using large downloaded files that are in a compressed format, it is necessary to_____ them. A) Copy B) Extract C) Open D)
    9·1 answer
  • If you were investigating login issues on a Windows computer, which portion of the Event Viewer logs would be a good place to st
    7·1 answer
  • Can someone buy me eddie van der tabs???
    13·1 answer
  • ____ is an approach to boundary spanning which results from using sophisticated software to search through large amounts of inte
    5·1 answer
  • The tremendous diversity ofthe source system is the primary reason for their complexity. Doyou agree/ If so, explain briefly why
    11·1 answer
  • Consider the following class interfaces:
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!