which of the following govern how the network is configured and operated as well as how people are expected to behave on the network?

Answers

Answer 1

Answer:

There are several factors that can govern how a network is configured and operated, as well as how people are expected to behave on the network. Some examples of these factors include:

Network policies: These are guidelines and rules that dictate how the network should be configured and used. Network policies may cover topics such as security, access control, usage guidelines, and acceptable use policies.

Network architecture: The design and layout of the network, including the types of devices and technologies used, can have an impact on how the network is configured and operated.

Network protocols: Protocols are standards and rules that govern how devices on the network communicate with each other. Different protocols may be used for different types of communication, such as data transfer, routing, and security.

Industry standards: Industry standards are guidelines and best practices that are widely followed within a particular industry. These standards may dictate how networks should be configured and operated within that industry.

Legal and regulatory requirements: In some cases, networks may be subject to legal and regulatory requirements that dictate how they should be configured and operated. These requirements may vary depending on the location and industry of the network.


Related Questions

Use the drop-down menus to describe how to add a data bar to a report.
1. Open the table in view.
2. Click the column of the desired numerical field.
3. Click the conditional tab Format, then .
4. In the Rules Manager dialog box, click .
5. Select to “compare to other records,” and determine whether you want the value and bar to show at the same time.
6. Adjust the desired length of the bar and the color. Click OK.
7. Once satisfied with your rule, click and then OK.

Answers

Answer:

1. layout

3. conditional formatting

4. new rule

7. apply

Explanation:

just did it on edge

Write the mostValuableNeighbor method, which compares the item in row r and column c to the items to its left and to its right. The method determines which of the three items has the greatest value and returns its name. If more than one of the values have a value that is greatest, then any of their names can be returned. If the item has no item to its left, it is compared only to the item to its right. If the item has no item to its right, it is compared only to the item to its left.

Answers

Answer:

Explanation:

The following method is written in Java, using the Item class and ItemGrid class found online we can use this method to grab the 2-dimensional array and compare the three neighbors in the same row. It saves the position of the neighbor with the greatest value in the variable greatest and then uses that position to call the getName() method from the object in that position to get the name of that Neighbor and returns the name.

public String mostValuableNeighbor(ItemGrid grid, int r, int c) {

       int greatest = grid[r][c];

      if (grid[r][c+1].getValue() > greatest.getValue()) {

          greatest = grid[r][c+1];

      }

       if (grid[r][c-1].getValue() > greatest.getValue()) {

           greatest = grid[r][c-1];

       }

       

      return greatest.getName();

   }

In this exercise we have to use the knowledge of computational language in JAVA to write the code.

We have the code in the attached image.

The code in Java can be found as:

public String mostValuableNeighbor(ItemGrid grid, int r, int c) {

      int greatest = grid[r][c];

     if (grid[r][c+1].getValue() > greatest.getValue()) {

         greatest = grid[r][c+1];

     }

      if (grid[r][c-1].getValue() > greatest.getValue()) {

          greatest = grid[r][c-1];

      }

     return greatest.getName();

  }

See more about JAVA at brainly.com/question/26104476

Discuss with illustrations the
types and benefits of enterprise storage systems.

Answers

Answer:

An Enterprise Storage System is a centralized repository for business information. It provides a common resource for data sharing, management and protection via connections to other computer systems.

Enterprise storage systems are designed to process heavy workloads of business-critical information.

Benefits

High availability

Reliable backup and disaster recovery

Convenient data sharing

Centralized administration

Remote support.

What is the command to launch each of the following tools? Local Group Policy Local Security Policy Computer Management console Local Users and Groups console Resultant Set of Policy (RSoP)

Answers

Answer:

The command for

Local Group Policy  is GPedit.msc

Local Security Policy is SecPol.msc

Computer Management console is Compmgmt.msc

Local Users and Groups console is Lusrmgr.msc

Resultant Set of Policy is RSOP.msc

Explanation:

The command for

Local Group Policy  is GPedit.msc

Local Security Policy is SecPol.msc

Computer Management console is Compmgmt.msc

Local Users and Groups console is Lusrmgr.msc

Resultant Set of Policy is RSOP.msc

examples of pop in computer​

Answers

Answer:

Short for Post Office Protocol, POP or POP mail is one of the most commonly used protocols used to receive e-mail on many e-mail clients. There are two different versions of POP: POP2 and POP3. POP2was an early standard of POP that was only capable of receiving e-mail and required SMTP to send e-mail. POP3 is the latest standard and can send and receive e-mail only using POP, but can also be used to receive e-mail and then use SMTP to send e-mail.

Which range of values would result in 10 elements stored in an array?

1-11

0-9

0-10

2-12

Answers

Answer:

0-9

Explanation:

count 0 as 1

len(0,1,2,3,4,5,6,7,8,9)=10

RAM IS often referred
to as
1 SECONDARY STORAGE
2 . READ ONLY MEMORY
3. RATIO ACTIVE MEMORY
4. PRIMARY STORAGE

Answers

Answer:

ratio active memory

Explanation:

ratio active memory because the rule of computer

Before hard disk drives were available, computer information was stored on:

Floppy Disks

Cassette Tapes

Punch Cards

All of the Above

Answers

floppy disks . is the answer

Parts arrive at a two-machine system according to an exponential interarrival distribution with mean 20 minutes. Upon arrival, the parts are sent to Machine 1 and processed. The processing-time distribution is TRIA (4.5, 9.3, 11) minutes. The parts are then processed at Machine 2 with a processing-time distribution as TRIA (16.4, 19.1, 20.8) minutes. The parts from Machine 2 are directed back to Machine 1 to be processed a second time (same processing-time distribution but an independent draw from it). The completed parts then exit the system. Run the simulation for a single replication of 20,000 minutes to observe the average number in the machine queues and the average part cycle time with Arena Model

Answers

Answer:

I really don’t know computer science but I give u good luck in finding an answer to this question.

Explanation:

What are the purposes of a good web page design? The purpose of a good web page design is to make it and .

Answers

Answer:

responsiveness and intuitive

Explanation:

The two main purposes of a good web page design is responsiveness and intuitive. A webpage needs to be designed in such a way that the individual using it can easily find what they are looking for and understand what each function in the webpage does without having to ask for help or go through an extensive tutorial. They need to be able to use the website for the first time and immediately be able to use it as if they have used it countless times before. The webpage also needs to be designed with responsiveness in mind. So much so that the webpage runs fluently, loads images fast, and scales to the size of the monitor correctly. As a rule the webpage should not take longer than 2 seconds to load.

describe email etiquette and netiquette when communicating electronically.

Answers

Answer:

Email etiquette refers to the principles of behavior that one should use when writing or answering email messages. It is also known as the code of conduct for email communication. Email etiquette depends upon to whom we are writing- Friends & Relatives, Partners, Customers, Superior or Subordinates

Difference Between Etiquette and Netiquette is that Etiquette is the simple requirements needs for social behavior while Netiquette, is the code of acceptable behaviors users should follow while on the Internet.

he is trying to find information on the internet first he navigated to a search engine entered the keywords database administrator and clicked on search the results did not show what it was looking for​

Answers

Answer:

b

Explanation:

b

Many individuals and organizations are choosing cloud storage for their important files. Discuss the pros and cons of cloud storage for both personal files and business files. Many individuals and organizations are choosing cloud storage for their important files. Discuss the pros and cons of cloud storage for both personal files and business files. What inputs and outputs are needed to support the storage environment

Answers

Answer:

Pros of cloud storage

Files can be accessed remotely without having to be connected to a company's intranetSecurity and file backups are managed by the cloud storage company, frees up employees time applying updates and other maintenance tasks.Usually billed monthly which allows for a lower initial startup cost

Cons of cloud storage

File security relies upon trust in the cloud storage providerLong term cost could be higher than storing files yourselfRequires an internet connection to access files

What is a foreign key? a security key to a database that stores foreign data a security key to a database located in another country a field in a table that uniquely identifies a record in a relational database a field in a table that links it to other tables in a relational database

Answers

Answer: a field in a table that links it to other tables in a relational database

A - a security key to a database that stores foreign data

What is the benefit of making an archive folder visible in the Outlook folder list?

This makes the folder available on the Office 365 website.
The folder can be password protected to increase security.
Archived items in the folder are accessible within the Outlook client.
Archived items in the folder can be shared with other Outlook users.

Answers

Answer:

a

Explanation:

Suppose you have the following search space:

State
next
cost

A
B
4

A
C
1

B
D
3

B
E
8

C
C
0

C
D
2

C
F
6

D
C
2

D
E
4

E
G
2

F
G
8

Draw the state space of this problem.

Assume that the initial state is A and the goal state is G. Show how each of the following search strategies would create a search tree to find a path from the initial state to the goal state:
Breadth-first search
Depth-first search
Uniform cost search

Answers

Breadth

Depth

Uniform

U

9. Lael wants to determine several totals and averages for active students. In cell Q8, enter a formula using the COUNTIF function and structured references to count the number of students who have been elected to offices in student organizations.

Answers

Let understand that a spreadsheet perform function such as getting the sum, subtraction, averages, counting of numbers on the sheet rows and columns.

Also, the image to the question have been attached as picture.

Here, Lael wants to count the number of students who have been elected to offices in student organizations.

Lael will used the COUNTIF Function in the Spreadsheet to achieve the count because function helps to count cells that contain numbers.

In conclusion, the formulae that Lael should use on the Spreadsheet to count the number of students who are elected is "Q8 = COUNTIF(M2:M31, "Elected")"

Learn more about Excel function here

brainly.com/question/24826456/

Write a line of code that declares a variable called shipName and set it equal to the string SpaceX3000.

Answers

Answer:

shipName = "SpaceX3000"

Explanation:

Explain the paging concept and main disadvantages of pipelined
approaches? Compare the superscalar and super pipelined approaches
with block diagram?

Answers

Answer:

PAGINACIÓN En la gestión de memoria con intercambio, cuando ... Debido a que es posible separar los módulos, se hace más fácil la modificación de los mismos. ... Ventajas y Desventajas de la segmentación paginada

Explanation:

Information Technology​

Answers

Answer:

information technologies

Explanation:

Information technology is the study, design, development, implementation, support or management of computer-based information systems—particularly software applications and computer hardware. IT workers help ensure that computers work well for people.

Nearly every company, from a software design firm, to the biggest manufacturer, to the smallest “mom & pop” store, needs information technology workers to keep their businesses running smoothly, according to industry experts.

Most information technology jobs fall into four broad categories: computer scientists, computer engineers, systems analysts and computer programmers. HR managers responsible for recruiting IT employees increasingly must become familiar with the function and titles of the myriad job titles in demand today.

Some of them are listed below:

Database administration associate

Information systems operator/analyst

Interactive digital media specialist

Network specialist

Programmer/analyst

Software engineer

Technical support representative

Answer:

Information technology is the use of computers to store, retrieve, transmit and manipulate data, or information, often in the context of business or other enterpise

What is the creative strategy for music application.​

Answers

Answer:

The City of Vancouver has allocated $300,000 to support the growth and development of the Vancouver Music Strategy, developed to address current gaps in the music ecosystem that support: Creating a sustainable, resilient, and vibrant music industry.

Explanation:

A medium-sized highway construction company CST has chosen to constrain its investment in computing resources to laptop and desktop computers and the necessary networking hardware and software to access the Internet efficiently. All of CST's data is to be stored off-site through an Internet-enabled storage provider that is used by many different companies and organizations. The service model employed for the data storage capability of only CST is:

Answers

Answer:

The service model employed for the data storage capability of only CST is:

SaaS (Software as a Service).

Explanation:

The three cloud computing categories are Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS).  The three cloud computing services provide different virtual computing resources.  In the case of CST, it utilizes only the data storage software of a provider, who provides the data storage infrastructure, including cloud-based servers, while CST uses its own "laptop and desktop computers and other networking hardware and software to access the Internet efficiently."

When analyzing data sets, such as data for human heights or for human weights, a common step is to adjust the data. This adjustment can be done by normalizing to values between 0 and 1, or throwing away outliers.
For this program, adjust the values by dividing all values by the largest value. The input begins with an integer indicating the number of floating-point values that follow.
Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
print('{:.2f}'.format(your_value))
Ex: If the input is:
5 30.0 50.0 10.0 100.0 65.0
the output is:
0.30 0.50 0.10 1.00 0.65
The 5 indicates that there are five floating-point values in the list, namely 30.0, 50.0, 10.0, 100.0, and 65.0. 100.0 is the largest value in the list, so each value is divided by 100.0.
For coding simplicity, follow every output value by a space, including the last one
1 #include
2 #include
3 #include
4 using namespace std;
5
6 int main() {
7
8 /* Type your code here. */
9
10 return 0;
11 }
12

Answers

Answer:

5.23 LAB: Adjust values in a list by normalizing When analyzing data sets, such as data for human heights or for human weights, a common step is to adjust the data. This can be done by normalizing to values between 0 and 1, or throwing away outliers.

Explanation:

Think of an aspect of HTML that you found challenging to master. Why is that aspect of HTML important? What are some future situations that you could use it in?

Answers

Answer:

html is a thing that u can to create an website business that u can make money on it

1 There are several applications to assist you to surf through the internet, mention
three (3 marks)​

Answers

Email
Web browsing
Peer-to-peer services

(Hours, minutes, and seconds) Write a method that returns a string in the form of hour:minute:second for a given total seconds using the following header:
public static String format(long seconds)
Here is a sample run:

Enter total seconds: 342324
The hours, minutes, and seconds for total seconds 342324 is 23:05:24

Note that a zero is padded to hour, minute, and second if any of these values is a single digit.

Answers

Answer:

Answered below.

Explanation:

class Convert {

public static String format(long seconds) {

Scanner sc = new Scanner(System.in);

System.out.print("Enter total seconds: ");

int secs = sc.nextInt();

int hours = secs / 3600;

int minutes = (secs % 3600) / 60;

int seconds = (secs % 3600) % 60;

String timeFormat = hours + ":" + minutes + ":" + seconds;

return timeFormat;

}

}

Consider the following program:

def test_1():
test_3()
print("A")

def test_2():
print("B")
test_1()

def test_3():
print("C")
What is output by the following line of code?

test_1()

C

A
B
C

A
C

C
A

Answers

Answer:

this would be answer D

Explanation:

In this exercise we have to use the knowledge of computational language in python to write the code.

We have the code in the attached image.

The code in python can be found as:

def test_1():

test_3()

print("A")

def test_3():

print("C")

Back to test_1()

print("A")

What is program?

A computer can run multiple programs simultaneously, and each program can be in a different state. There are three states a program can be in: running, blocked, and ready. If a program is running, it means that it is currently using the computer's resources, such as the processor, memory, and I/O devices, to perform its tasks.

On the other hand, if a program is blocked, it means that it is waiting for a resource to become available, such as a file, network connection, or input from the user. In the scenario you mentioned, "Program A" is in the running state, meaning it is actively using the computer's resources.

Therefore, Program B" is in the blocked state, meaning it is waiting for a resource to become available so it can continue to run.

Learn more about program on:

https://brainly.com/question/30613605

#SPJ3

Acróstico sobre mouse

Answers

this is a PICTURE

i HOPE IT'S HELP

PLEASE HELP I REALLY NEED IT ASAP
Select the correct answer. Layla and her team have installed a fire alarm system in an office. The alarm system connects to a wireless network, so it can be monitored using smartphones and computers connected to the same network. Which wireless technology does the fire alarm system use?
OA satellite
OB. Bluetooth
O C. infrared
OD. WI-FI​

Answers

Answer:

wifi

Explanation:

if it's running on the same network that's wifi

Answer:

The correct answer is D. Wi-Fi.

Explanation:

I got it right on the Edmentum test.

Read the 4 entities below and assume that customer_id is the key common to all tables.
Customer: An entity that describes a customer. An instance occurs for unique customers only using name, date of birth, and login name as customer_id primary key.
Online: An entity that describes a customer purchasing activity online. An instance occurs when the customer completes the transaction. Customers can purchase more than once.
Visits: An entity that describes a customer purchase in a physical store. An instance occurs if a customer makes or purchase or checks-in using an app. Customers can visit more than once per day.
Satisfaction: An entity that represents data from a recent customer satisfaction survey. An instance occurs when a customer takes the Survey. A customer is tracked by login name and can only take the survey one time.
Use the information to match the following relationships. Answers can be reused more than once.
1. The relationship between Customer and Online.
2. The relationship between Customer and Satisfaction.
3. The relationship between Online and Visits.
4. The relationship between Visits and Satisfaction
A. prototype
B. one-to-one
C. Zero-sum
D. one-to-many
E. TOO many
F. many-to-many

Answers

Answer:

1. The relationship between Customer and Online - One to One

2. The relationship between Customer and Satisfaction - Many to Many

3. The relationship between Online and Visits - Zero sum

4. The relationship between Visits and Satisfaction - Prototype

Explanation:

The relationship between customers and satisfaction is important for any business. One disappointed customer will make a business to loose 10 new customers. The customer satisfaction is most important for any business and it is necessary to get feedback from customers in order to know whether the business service is adequate to satisfy a customer positively.

Other Questions
What income is not taxable? What is Mark Twain's message in The Adventures of Huckleberry Finn? The immune system can function through a generalized defense against pathogens called _____. What is the ratio of homozygous yellow with wrinkled seeds and homozygous round with green seeds in f2 of classical dihybrid cross is? How do you know if your business is carbon neutral? Based on the author's word choices in paragraph 1, which word best describes the authors tone?(A) critical(B) optimistic(C) annoyed(D) neutralRead the passage. The Great Pacific Garbage PatchTheres been talk that there is a giant pile of trash floating out in the middle of the Pacific Ocean. According to some reports, the Great Pacific Garbage Patch is supposedly twice the size of the state of Texas. This has led many people to envision a humongous pile, both in height and breadth. However, this is a gross exaggeration. True, there is trash floating around in the Pacific, but its quite different from what has been portrayed in the media. Nonetheless, there is still cause for concern.In an area of the northern Pacific Ocean where the northern jet stream and the southern trade winds create a high-pressure zone, the winds circulate in opposite directions. These winds create an area of 7.7 million square miles of circling water called the North Pacific Gyre, which covers most of the northern Pacific Ocean. In the middle of the gyre are pieces of plastic garbage. This garbage isnt a huge pile of floating pieces of trash, peoples tossed-away coolers, broken pieces of furniture, or boat seat cushions. Its more insidious than that. Caleb is a fashion designer. He designed a jacket with 2 types of fabric. Now Caleb has to make samples. He buys 68 yards of nylon and 94 yards of wool. The nylon is $3 a yard, and a yard of wool is 3 times more expensive. How much did Caleb spend? In the readings, a claim is made that ice cooling is a good way to cool large buildings. Create an argument to support this claim. Give reasons and evidence from the texts. Also tell what you may already know about air conditioning and temperature control. recently in riverside, building contractors lobbied the city council to pass a law requiring all people working on residential dwellings be licensed by the city. why would the contractors lobby for this requirement? Draw a diagram of the nitrogen cycle with labels describing the metabolic processes. Give examples of bacteria that carry out each of these metablic processes. How can I improve my daily decision making? 3 A driver leaves Beirut at the instant t=0, reaches Saida after 35 minutes. He rests for 11 minutes then drives 45 minutes to reach Tyre. TaGive the instants of the different described events. b What is the durations of the whole Journey A, Give the instant of the different described events Which is the solutions of the equations 5x 2y 7 *? Microscopic, shrimplike animals that have a hard exoskeleton that can be either herbivorous, carnivorous, or parasitic are called: How do you know if the limit is positive or negative infinity? You have blank when you divid both sides of equation 3n=12by 3 How do you find the amplitude when given the wavelength and frequency? How might Rikki's character and actions help the reader determine the theme? (USE THE R.A.C.E METHOD FOR YOUR ANSWER) To understand the core relation of farming methods,populationoccupation of people in the North eastern states of Manipur and Nagaland Which of the following statements regarding the process for determining a partnerships tax year-end is false?Multiple ChoiceThe least aggregate deferral test utilizes the partners profits interests to measure the amount of aggregate deferral.Only the partners profits interests are relevant when determining if a partnership has a majority interest taxable year.A partnership uses the tax year with the least aggregate deferral only if there is no majority interest tax year and the principal partners dont have the same year-end.Under the principal partners test, a principal partner is defined as a partner having an interest of 5% or more in the profits or capital of the partnership.