What is responsible for maintaining and administering computer networks and related computing environments including systems software, applications software, hardware, and configurations. a.network administrator/network engineer b.network security analyst c.systems engineer d.network consultant

Answers

Answer 1

Answer:Network Administrator/ Network Engineer

Explanation:


Related Questions

_____ is a system in which a finite set of words can be combined to generate an infinite number of sentences.

Answers

Generativity is a system in which a finite set of words can be combined to generate an infinite number of sentences.

What is a sentence?

A sentence is a grouping of words, phrases, or clauses that convey meaning to us. An object or a subject can be found in a sentence. These help the person to communicate with one another.

Generativity can be defined as the way to weigh A grammar or a sentence being spoken for. It is defined as a found set of the whole with is defined, usually made with a finite number, to create an infinite number of sentences or words combined.

Learn more about sentences, here:

https://brainly.com/question/12684453

#SPJ1

If you have a computer with three hard disks, what type of raid fault-tolerant configuration will make best use of them?

Answers

Answer:

RAID 1 or RAID 5

Explanation:

RAID 1 mirrors data across all disks, if you lose 1 disk, you still have 2 copies of that disk.

RAID 5 spreads data evenly across all disks with parity, if you lose 1 disk then lost data can be reconstructed. If you lose 2 disks then all data is most likely lost.

RAID 1 is ideal for important information. RAID 5 is ideal for storage efficiency and security.

If you were to type the following in a linux command line terminal, what type of results might you receive? cat /etc/passwd

Answers

If you were to type the following command "cat /etc / passwd" in a Linux command line terminal, the type of result which you might receive is; D) a list of the users on that Linux computer.

What is a Linux?

A Linux can be defined as an open-source and community-developed operating system (OS) that is designed and developed to be used on the following electronic computing devices:

Embedded systems.Mobile devices.Mainframes.Computers.

What is a Linux command?

A Linux command can be defined as a software program that is designed and developed to run on the command line, in order to enable an administrator (end user) of a Linux computer network perform both basic and advanced tasks by only entering a line of text.

Note: cat is simply an abbreviation for concatenate.

Generally speaking, the type of result which an end user might receive when he or she types the following command "cat /etc / passwd" in a Linux command line terminal is a list of all the registered users on that Linux computer.

Read more on Linux command here: https://brainly.com/question/13073309

#SPJ1

Complete Question:

If you were to type the following in a Linux command line terminal, what type of results might you receive? cat /etc / passwd

A) An encrypted list of all user's passwords for that Linux computer.

B) An un-encrypted list of all user passwords for that Linux computer.

C) A list of all user ID numbers for that Linux computer.

D) A list of the users on that Linux computer.

​you must have a for every variable you intend to use in a program. a. purpose b. variable definition c. memory space d. literal value e. none of these

Answers

Answer:a

Explanation:

What is not a common endpoint for a virtual private network (vpn) connection used for remote network access?

Answers

Answer:

I believe It is Content filter as I studied before.

Explanation:

I hack

In older languages, you could leave a selection or loop before it was complete by using a ____ statement. group of answer choices

Answers

In older languages, you could leave a selection or loop before it was complete by using a goto statement. The correct option is D.

What is a go to statement?

The goto statement is also referred to as the jump statement. It is used to pass control to another section of the program.

It always jumps to the specified label. It can be used to pass control from a deeply nested loop or switch case label to another.

The machine code produced by goto will be a direct jump. And it will most likely be faster than a function call.

Thus, the correct option is D.

For more details regarding goto statement, visit:

https://brainly.com/question/12975443

#SPJ1

Your question seems incomplete, the missing options are:

A) next

B) go next

C) loop

D) go to

In the ____ letter style, the date, complimentary close, and signature block are positioned approximately one-half inch to the right of center or at the right margin.

Answers

In the modified block letter style, the date, complimentary close, and signature block are positioned approximately one-half inch to the right of center or at the right margin.

There are certain ways in which a business letter should be written and following of the correct protocol for writing business letters is important.

Among the various letter types is the modified block letter style in which there is a single space in between the body, and the addresses of both the recipient and the sender. A single space accounts for approximately one-half inch to the right of center or at the right margin in such type of letter.

Modified block letter styles are similar to full-block business letters with only a few changes.

To learn more about modified block, click here:

https://brainly.com/question/15210922

#SPJ4

PLEASE HELP!! This is a question. Please answer using python. Only if you have experience. I will give the first person brainliest!

Answers

Answer:

what question is this ?? can you be more specific i need more details on the question

Explanation:

The program written in Python programming language that performs the required computations is:

n = int(input("n: "))

while n != 1:

   if n%2 == 0:

       n = int(n/2)

   else:

       n = int(3 * n + 1)

   print(n)

How to write the program in Python programming language?

The program written in Python programming language, where comments are used to explain each line is as follows:

#This gets input for n

n = int(input("n: "))

#The following loop is repeated until the value of n is 1

while n != 1:

#This checks if n is an even number; n is halved, if this condition is true

   if n%2 == 0:

       n = int(n/2)

#If n is an odd number; n is tripled and increased by 1

   else:

       n = int(3 * n + 1)

#This prints the sequence of numbers generated

   print(n)

The above program generates the sequence of numbers for n

Read more about python programs at

https://brainly.com/question/26497128

#SPJ1

we want you to write a function, organizeitems, that organizes items by category. the argument to the function is an array of item objects. each item object has 3 properties, category (string), itemname (string), and onsale (boolean). here's an example:

Answers

A function, organize items, that organizes items by category.

The Function

const itemData =

 [ { category: 'fruit',  itemName: 'apple', onSale: false }

 , { category: 'canned', itemName: 'beans', onSale: false }

 , { category: 'canned', itemName: 'corn',  onSale: true  }

 , { category: 'frozen', itemName: 'pizza', onSale: false }

 , { category: 'fruit',  itemName: 'melon', onSale: true  }

 , { category: 'canned', itemName: 'soup',  onSale: false }

 ]

const result = itemData.reduce((r,{category,itemName,onSale})=>

 {

 r[category] = r[category] || []

 r[category].push( itemName + (onSale?'($)':''))

 return r

 },{})

// show result

console.log( JSON.stringify(result)

                .replace(`{"`,`\nresult =\n  { `)

                .replace(/"],"/g,`' ]\n  , `)

                .replace(`"]}`,`' ]\n  }`)

                .replace(/":\["/g,`: [ '`)

                .replace(/","/g,`', '`))

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

Which of the following is equivalent to a subroutine depending on the programming language?(1 point)

function


model

accessor


mutator

Answers

Mutator and Accessor are equivalent to a subroutine, depending on the programming language. Thus, options B and D are correct.

What is a programming language?

Programming languages are a type of electronic medium that includes strings, graphical designs, and other visual components. They are essentially machine outputs that a person may use.

Immediate access to personal parameters including their mutator and accessor methods are available.

Attributes need to guarantee comprehensive security of the information essential to provide a class its initial meaning, which would need a person to back up the data with the help of a programming language. Therefore, option  B and D is the correct option.

Learn more about Programming languages, here:

https://brainly.com/question/13563563

#SPJ1

what is our main external body part?​

Answers

Answer: Skin

Explanation: It’s the largest organ in the body and one of the most complicated. Not only does the skin hold everything in, it also plays a crucial role in providing an airtight, watertight and flexible barrier between the outside world and the highly regulated systems within the body.

(I hope this helped)

When a software program is purchased, the buyer is acquiring a(n) ____ that permits him or her to use the software.

Answers

Answer:

Software License.

Explanation:

The only reason i know this to disrupt and make hacks with a team for different video games.

During the _____ of the systems development life cycle (sdlc), a new system is constructed. group of answer choices

Answers

During the systems support and security phase of the systems development life cycle (SDLC), a new system is constructed. The correct option is A.

What is SDLC?

The systems development life cycle, also known as the application development life cycle in systems engineering, information systems, and software engineering, is a process for planning, creating, testing, and deploying an information system.

The primary objective of an SDLC methodology is to give IT Endeavor Managers the toolkits they need to guarantee the successful implementation of systems that meet the University's strategic and business goals.

A new system is built during the systems support and security phase of the systems development life cycle (SDLC).

Thus, the correct option is A.

For more details regarding SDLC, visit:

https://brainly.com/question/14096725

#SPJ1

Your question seems incomplete, the missing options are:

a. ​systems support and security phase

b. ​systems planning phase

c. ​systems implementation phase

d. ​systems analysis phase

Veronica and doug devised a scheme to defraud by sending a message via e-mail to thousands of computer users, hoping to get rich from those who responded. This is their first attempt at this scheme. They may have violated:

Answers

The act of Veronica and doug devising a scheme to defraud by sending a message via e-mail to thousands of computer users, hoping to get rich from those who responded, is a violation of computer security policies. It’s called email phishing.

It’s an email attack in which the attacker sends a large number of malicious emails to a broad audience. It is the most prevalent kind of email attack. Phishing attacks can include any malicious email that tries to fool you into clicking a link, opening a file, or performing any other harmful action.

Learn more on phishing attacks here: https://brainly.com/question/2547147#

#SPJ4

Why would a network administrator issue the show cdp neigbors command on a router?

Answers

Answer: To display device ID and other information about directly connected Cisco devices.

Explanation: The show cdp neighbors detail command reveals the IP address of a neighboring device. The show cdp neighbors detail command will help determine if one of the CDP neighbors has an IP configuration error. To disable CDP globally, use the global configuration command no cdp run.

6) What is a folder?​

Answers

Answer: a folder is a folding cover or holder, typically made of stiff paper or cardboard, for storing loose papers.

Explanation:

A folder is a directory or a location where electronic documents are stored for reference purposes

Early opera was originally designed to reflect the manner in which seventeenth-century aristocrats sung their conversations to each other on a daily basis. True or false?.

Answers

False because you can’t I already sloved it

convert the inchestocentimeters program to an interactive application named inchestocentimeterslnteractive. instead of assigning a value to the inches variable, accept the value from the user as input. display the measurement in both inches and centimeters—for example, if inches is input as 3, the output should be: 3 inches is 7.62 centimeters.

Answers

Answer:

using static System.Console;

class InchesToCentimetersInteractive

{

  static void Main()

  {

     const double CENTIMETERS_PER_INCH = 2.54;

     double inches = 3;

     WriteLine("Please enter the inches to be converted: ");

     inches = double.Parse(ReadLine());

     WriteLine("{0} inches is {1} centimeters", inches, inches * CENTIMETERS_PER_INCH);

  }

}

Explanation:

What type of malware collects information about the user's browsing habits in order to display advertisements targeted to that user?

Answers

Answer:

there are many

Explanation:

the most common one that does this is spyware

not only that nowadays anything is infected with virus or some kind of malware in websites and there are millions of trackers and all of these nonsense things which really make the web using today a hard place

but you can use BRAVE

Aspects of the social context that a person grew up in and is now functioning in (macro level context) include:_____

Answers

Aspects of the social context that a person grew up in and is now functioning in (macro level context) include option C) Prejudice and discrimination.

How are prejudice and discrimination related?

Discrimination is known to be a term that tends to influence people in regards to opportunities as well as their well-being.

Note that consistent exposure to issues of discrimination can be a factor that lead people to internalize the  issues or topic of prejudice or stigma that is known to be linked or directed against them, showing in shame, low self-esteem, fear and others.

Therefore, Aspects of the social context that a person grew up in and is now functioning in (macro level context) include option C) Prejudice and discrimination.

Learn more about discrimination from

https://brainly.com/question/1084594
#SPJ1

Aspects of the social context that a person grew up in and is now functioning in (macro level context) include:

A)Religious group

B)Social class

C)Prejudice and discrimination

D)Family values

Database segmentation, marketing automation, and multichannel communication are examples of strategies that happen at which stage of your marketing flywheel?.

Answers

Database segmentation, marketing automation, and multichannel communication are examples of strategies that happen at the Engage stage of your marketing flywheel.

What is Flywheel inbound marketing?

This is one that is made up of three steps of the inbound flywheel are attract, engage, and delight. The flywheel method is one that is used by inbound firms to make  credibility, trust, as well as momentum. It's about bringing value to your customers at each point of their journey.

The marketing flywheel is made up of

Attract and earn buyers' attentionEngage with your audience, etc.

Therefore, Database segmentation, marketing automation, and multichannel communication are examples of strategies that happen at the Engage stage of your marketing flywheel.

Learn more about Database segmentation from

https://brainly.com/question/14315539
#SPJ1

Database segmentation, marketing automation, and multichannel communication are examples of strategies that happen at which stage of your marketing flywheel?

Attract

Engage

Delight

Consideration

What decimal value does the 8-bit binary number 10011110 have if it is on a computer using two's complement representation?

Answers

The 8-bit binary number 10011110 have decimal value of -98 if it is on a computer using two's complement representation.

The MSB displays the sign in the 2's complement representation of binary integers by using a '0' for the positive sign and a '1' for the negative sign. Magnitude representation is done using the remaining bits. The largest value that an 8-bit binary number can represent is decimal 255, or binary 11111111. Its calculated as follows: 1*128 +1*64+1*32+1*16+1*8+1*4+1*2+1+1 = decimal 255.

Learn more on 8-bit binary number here: https://brainly.com/question/21807213#

#SPJ4

How can I design a digital prototype from a paper prototype?

2 Sentences!!

Answers

To get a digital prototype from a paper prototype, the designer should endeavor to:

Note the design that they want to test and draw them with the use of markers. Then, they can convert these to digital form and run them.

How can a digital prototype be created?

A digital prototype can be created by first understanding the design that is to be created. Designers can either choose to have a digital or paper prototype. The problem with the paper prototype is the fact that it does not allow for user interaction. However, it is still a good way to understand things like color schemes.

So, when a designer gets an idea, he or she can note this on paper and even make some colorings that will allow for a better understanding of the material. Next, they can create the digital form of the design and test run this on a system. When they follow all these steps, they will e able to obtain a better result.

Learn more about prototypes here:

https://brainly.com/question/7509258

#SPJ1

if you break your computer chip, can you sell it

Answers

Answer:

No. You can't

Explanation:

It's because a broken computer chip is of no value after being broken

Select the term(s) that are considered a function of epithelial tissues by clicking the box(es).

Answers

The terms that are considered a function of epithelial tissues include

absorption

filtration

protection

secretion

What is an epithelial tissue?

The epithelium is a form of body tissue that covers all of the internal and exterior body surfaces, lines hollow organs and body cavities, and makes up the majority of glandular tissue..There are many epithelial tissues in the human body. They make up the majority of the tissue in glands, line body cavities and hollow organs, and cover all of the body's surfaces. Protection, secretion, absorption, excretion, filtration, diffusion, and sensory reception are just a few of the many tasks they carry out.

Protection from the environment, coverage, secretion and excretion, absorption, and filtration are the primary roles of epithelia. Tight junctions, which create an impermeable barrier, connect cells.

Therefore, the terms that are considered a function of epithelial tissues include.absorption, filtration, protection, and secretion.

Learn more about tissue on:

https://brainly.com/question/17301113

#SPJ1

Select the term(s) that are considered a function of epithelial tissues by clicking the box(es).

absorption

filtration

digestion

protection

secretion

Develop a flowchart that will request the names and ages of 2 persons. The flowchart will print the name of the oldest person


ONLY WHAT GOES INSIDE THE SHAPES.

Name1 Name2
Age1 age2

Answers

In order to develop the flowchart, you would need an algorithm for it and it is given below:

Start

Int Age1

Int Age2

Int Name1

Int Name2

Display "Enter your name"

Display "Enter your age"

Print "Your ages are:" Age 1; Age 2

Print "Your names are:" Name 1; Name 2

End

What is a Flowchart?

This refers to the type of diagram that is used to represent a workflow or process

Hence, we can see that In order to develop the flowchart, you would need an algorithm for it and it is given below:

Start

Int Age1

Int Age2

Int Name1

Int Name2

Display "Enter your name"

Display "Enter your age"

Print "Your ages are:" Age 1; Age 2

Print "Your names are:" Name 1; Name 2

End

Read more about flowcharts here:

https://brainly.com/question/6532130

#SPJ1

Codehs 4. 5 Circle movement- Need help. Here's the problem:


Create two variables x and y and set x = get_width()/2 and y=get_height()/2. Create a circle at position x,y with radius 45. Used the keydown method to move the circle up, down, left and right with the w,s,a,d keys. If you finish create more key movements with diagonals q,e,z,c and increase and decrease size with r,f and change to a random color with x

Answers

Using the knowledge of computational language in python  it is possible to write a code that used the keydown method to move the circle up, down.

Writting the code:

x = Mouse.x-Circle1.x

dy = Mouse.y-Circle1.y

length = sqrt(dx*dx+dy*dy)

if (length > Circle.radius)

 ratio = Circle1.radius/length

 Circle2.x = Circle1.x + dx*ratio

 Circle2.y = Circle1.y + dy*ratio

else

 Circle2.x = Mouse.x

 Circle2.y = Mouse.y

end

See more about python at brainly.com/question/18502436

#SPJ1

The term _________________ refers to two or more computers that are connected together in order to share hardware, software, and/or data.

Answers

The term network refers to two or more computers that are connected to share hardware, software, and/or data.

What are hardware and software?The physical, observable components of computers, such as the monitor, keyboard, and speakers, are referred to as hardware. The software consists of the operating systems and applications that must be installed. The Processor, Memory Devices, Monitor, Printer, Keyboard, Mouse, and Central Processing Unit are a few examples of hardware in a computer. Computer programs: A computer system's software is made up of a variety of instructions, processes, and documentation. Software refers to the processes and programs that enable a computer or other electrical device to function. Software like Excel, Windows, or iTunes is examples. A computer system's input, processing, storage, output, and communication devices are its five basic hardware constituents.

To learn more about hardware and software, refer to:

https://brainly.com/question/23904741

#SPJ4

I'm doing CodeHS 4.3.6 Adding Terrain. If anyone can help with the code, that would be wonderful

Answers

Answer:hard

Explanation:

Complete the expression so that user_points is assigned with 0 if user_items is greater than 25 (second branch). Otherwise, user_points is assigned with 10 (first branch).

user_level = int(input()) # Program will be tested with values: 15, 20, 25, 30, 35.

if ''' Your code goes here ''':
user_points = 10
else:
user_points = 0

print(user_points)

What is the answer for Python please

Answers

The required expression that completes the code in Python is

if (user_level<= 25):

The complete code is given below that assigns 10 to “user_points” in case “user_level” is less than and equal to 25, and assigns “user_points” 10 if the “user_level” is greater than 25.

user_level = int(input("Enter some values from 15,20,25,30,35 :  " ))

       # requires to input some value from 15, 20, 25, 30, 35

if (user_level<= 25):        

   user_points = 10

''' checks whether “user_level” is less than and equal to 25. If it is evaluated to true then control goes to its body where 10 is assigned to “user_points '''

else:

   user_points = 0

''' in case “if conditions” is evaluated to false then else runs where 0 is assigned to “user_points” '''

print(user_points)

 # prints user_points

You can learn more about if-else in python at

https://brainly.com/question/28032696

#SPJ4

Other Questions
Select all that apply what are the four components of a swot analysis? threats organization strengths weaknesses technology opportunities 3. EVALUATING ARGUMENTS List one good argument fora large federal role in education and one argument forlocal/state control. Which argument is stronger? Explainyour answer. Whats the missing side length? Please help. Round 274.886850722 to the nearest hundredth. Used by many smaller companies to help streamline procurement or distribution processes, ________ is an internet site whose purpose is to be a major starting point for users when they connect to the web. PLEASE HELP ME WITH THIS What is the following product? Assume b greater-than-or-equal-to 0StartRoot b EndRoot times StartRoot b EndRootb StartRoot b EndRoot2 StartRoot b EndRootbb2 A 101.96 g sample of a solid is broken down into 53.96 g of aluminum and an unknown amount of oxygen. if a chemist wants to make 1,937 grams of that solid without any leftovers, how much aluminum and oxygen should she react together? Brody is older than Nathan. Their ages are consecutive odd integers. Find Brody's ageif the sum of Brody's age and 5 times Nathan's age is 80. The phylogenetic tree below has been used both to support and to contest the hypothesis that an intermediary species was responsible for the zoonosis of SARS-CoV-2 from bars to humans. Discuss. (6 marks) Suppose there is a 1.1 degree drop in temperature for every thousand feet that an airplane climbs into the sky. If the temperature on the ground is 59.5 degrees, what will be the temperature when the plane reaches an altitude of 8,000 feet? Express your answer as a decimalplease asap instead of writing 35/6 as a decimal correct to 3 significant figures,a student wrote it correct to 3 places of decimal. find his percentage error in standard form. Observations that people may actually process and manipulate information rather than simply store it for brief periods of time challenged the conceptualization of. Please help I need to turn this in. Find the measure of angle Y 12.A student is finding thetotal cost c, including sales tax, of a bookthat costs $9.95. The sales tax rate is 9%.Find the student's mistake and correct it.C = 1.9 x 9.95C 18.91C $18.91 You can use the numbers and the units more than once. the two fundamental qualities of useful information are group of answer choices relevance and faithful representation. verifiability and timeliness. comparability and flexibility. understandability and consistency. 18Select the correct texts in the passage.Which two details are most important to include in a summary of the excerpt?excerpt from Robinson Crusoeby Daniel DefoeAt length I spied a little cove on the right shore of the creek, to which with great pain and difficulty | guided my raft, and at last got : near that,reaching ground with my oar, I could thrust her directly in. But here I had e to have dipped all my cargo into the sea again; for that shore lyingpretty steep-that is to say sloping-there was no place to land, but where one end of my float, it ran on shore, would lie so high, and thewas at the highest, keeping the raftother sink lower, as before, that would endanger my cargo again. All that I could do was to wait till the tidewith my oar like an anchor, to hold the side of it fastto the shore, near a flat plece of ground, which I expected the water would flow over; andso it did. As soon as I found water enough- for my raft drew about a foot of water-I thrust her upon that flat plece of ground, and therefastened or moored her, by sticking my two broken oars into the ground, one on one side near one end, and one on the other side near theother end; and thus I lay till the water ebbed away, and left my raft and all my cargo safe on shore.ResetNext please help me with math