List four activities involved in managing any network to ensure quality control.

What will be an ideal response?


Monitor network traffic to develop a baseline from which to make network-related decisions

Unusual activity monitoring such as successive login failures, or file creation or file write errors

Disk resource utilization issues

Software and hardware installation and upgrades

Backup scheduling

Help desk support for problem resolution

Short-range and long-range planning

Computer Science & Information Technology

You might also like to view...

In a function header, in addition to the name of the function, you are required to furnish

A) a data type for each parameter. B) an identifier name for each parameter. C) the data type of the return value. D) all of the above. E) B and C, but not A.

Computer Science & Information Technology

__________ will integrate with the operating system of a host computer and monitor program behavior in real time for malicious actions.

A. Fingerprint-based scanners B. Behavior-blocking software C. Generic decryption technology D. Heuristic scanners

Computer Science & Information Technology

The Structure statement itself reserves locations in the computer's internal memory.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A miniature representation of a window or a file is a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology