In __________, the network designer examines the available technologies and assesses which options will meet the users' needs.
a. technology design
b. needs analysis
c. narrow and deep analysis
d. cost assessment
e. distribution layering
Ans: a. technology design
You might also like to view...
Answer the following statements true (T) or false (F)
1) In a public-key algorithm, one key is used for both encryption and decryption. 2) Digital certificates are intended to be used indefinitely. 3) Secure Sockets Layer protects data stored on a merchant’s server. 4) Digital signatures can provide undeniable proof of the author of a document. 5) In a network of 10 users communicating using public-key cryptography, only 10 keys are needed in total.
You would ________ a table if you wanted to display only data that matches specific criteria
A) scale B) freeze C) sort D) filter
Which protocol enables a remote access of shared files and folders?
a. NetBIOS b. TCP/IP c. SMB d. IPC
Which of the following types of cloud computing would be MOST appropriate if an organization required complete control of the environment?
A. Hybrid Cloud B. Private cloud C. Community cloud D. Community cloud E. Public cloud