What are the skills needed by a network administrator??
What will be an ideal response?
?Because many network administrators are dealing with both computers and people, they need the skills necessary to work with both. A checklist of skills for the network administrator would include a wide platform of technology skills, including, but not limited to, knowledge of local area networks, wide area networks, voice telecommunications systems, data transmission systems, video transmission, basic hardware concepts, and basic software skills. A network administrator should also have interpersonal skills, including the ability to talk to users in order to service problems and explore new applications. Along with interpersonal skills, a network administrator also needs training skills, which involve the ability to train users or other network support personnel.?To make effective use of limited resources, a network administrator should also possess a number of common management skills. For one, the network administrator should have budget management skills, which include knowing how to prepare a budget to justify continuing funds or to request additional funds. Along with those skills, a network administrator needs basic statistical skills, which means that he or she must know how to collect and use system statistics to justify the performance of existing systems or to validate the addition of new ones. Time management skills are also a necessity. These include the ability to manage not only one's own time, but also that of projects and any information technology workers who may be working for the administrator. Just as valuable as time management skills are project management skills, which center on the ability to keep a project on schedule and to use project-estimating tools, project-scheduling tools, and other methods for continuous project assessment. Finally, a network administrator should possess policy creation and enforcement skills, which include the ability to create policies concerning the use of the computer systems, access to facilities, password protection, access to applications, access to databases,
distribution of hardware and software, replacement of hardware and software, and the handling of service requests.
You might also like to view...
To view additional information or modify labels, you would click the ________ conceptual tab
A) Chart Elements B) Chart Styles C) Chart Area D) Chart Editing
Use the ______ attribute on a td element to associate it with a table heading cell
a. th b. headers c. heading d. title
Which of the following is the block cipher used by most TCP/IP applications that use that type of cipher?
A. Rivest Cipher 4 (RC4) B. Advanced Encryption Standard (AES) C. Data Encryption Standard (DES) D. Rivest Shamir Aleman (RSA)
Which of the following is not required in general-list insertion?
A. Insert into an empty list. B. Insert at the beginning of the list. C. Insert at the end of the list. D. Insert a duplicate key. E. Insert in the middle of the list.