In __________, the network designer examines the available technologies and assesses which options will meet the users' needs.

a. technology design
b. needs analysis
c. narrow and deep analysis
d. cost assessment
e. distribution layering


Ans: a. technology design

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1) In a public-key algorithm, one key is used for both encryption and decryption. 2) Digital certificates are intended to be used indefinitely. 3) Secure Sockets Layer protects data stored on a merchant’s server. 4) Digital signatures can provide undeniable proof of the author of a document. 5) In a network of 10 users communicating using public-key cryptography, only 10 keys are needed in total.

Computer Science & Information Technology

You would ________ a table if you wanted to display only data that matches specific criteria

A) scale B) freeze C) sort D) filter

Computer Science & Information Technology

Which protocol enables a remote access of shared files and folders?

a. NetBIOS b. TCP/IP c. SMB d. IPC

Computer Science & Information Technology

Which of the following types of cloud computing would be MOST appropriate if an organization required complete control of the environment?

A. Hybrid Cloud B. Private cloud C. Community cloud D. Community cloud E. Public cloud

Computer Science & Information Technology