What is network management?

Answers

Answer 1
Answer: Network management is  a broad range of  functions including activities, methods, procedures and the  use of  tools to administrate,operate,and  reliably maintain computer network system.  

Related Questions

____ refers to data, applications, and even resources stored on computers accessed over the Internet. Answera. Embedded computingb. The Ethernetc. Telecommutingd. Cloud computing
___ are files of related records organized according to logical systems and stored on computer-accessible media.
The set of instructions that allows a particular program to complete a task.
Match each word to its correct meaning. 1. brick-and-mortar 2. dashboard 3. data warehouse A.) a database that contains a large volume of company data B.) a visual data analysis toolC.) a physical store, as opposed to its "online" presence in a Web site
About 15 percent of American households have access to the media. Please select the best answer from the choices provideda. True b. False

Jose has developed a nutrition app for people to log their food intake. His app’s servers occasionally go down, and when he totals the amount of downtime, it is one day out of every 100 days. Should he be concerned?A.
Yes, because any amount of downtime is unacceptable.

B.
Yes, because his downtime is more than 0.01 percent.

C.
No, because it is normal for an app to be down 1 percent of the time.

D.
No, because the downtimes are usually at night, so users won’t be affected.

Answers

The correct answer is B.

A variable's ________ describes the kind of values that can be held by the variable, how the variable is stored in computer memory, and the types of operations that can be performed with it.a. data type
b. name
c. keyword
d. identifier

Answers

A variable's data types describes the kind of values that can be held by the variable.

What is a variable?

A variable is a container for storing value . A variable is a memory location where you store a value.

A variable can be used to store different data types.

Data types includes strings, integers, float and many more.

The data types describes the kind of value that can be held by the variable.

For example, string datatypes holds text and the float datatypes holds decimal numbers.

Therefore, the variable's data types describes the kind of values that can be held by the variable.

learn more variables here:brainly.com/question/13378513

#SPJ2

A. Data Type.

Data Types can be integers, strings, chars, shorts, ect, and describes what types of values can be stored.

By default, text is _____ in a cellA.) left-aligned
b.) centered
C.) justified
D.) right-aligned

Answers

To answer this question, I am assuming you are talking about a table in a word document or a spreadsheet. The answer is A - left-aligned. 

For text to be centred, justified or right-aligned, the user needs to highlight the cell and set one of these options manually. You cannot set the text in a single cell to be left-aligned, centered and right-aligned at the same time. All three are mutually exclusive which means text can only be set to any one of the three justifications. 

Of the following tasks, which one CANNOT be easily accomplished with a Wiki? Collaborating Social networking Editing Reading

Answers

Social networking.... pretty much all wikis let u edit of course u can read them and collaborating easy enough.... social networking not possible

If your body were a house, your skeleton would be the house's ___________.A.
rooms
B.
roof
C.
wooden frame

Answers

i think the answer is c wooden frame

It would be C. wooden frame.

Hope This Helps You!

Using MRTG, Ntop, and SNMPC to collect flow data from your routers and switches to identify traffic/packet anomalies is an example of a _____________, ____________-based IDS/IPS.

Answers

Is an example of reactive, signature based IDS/IPS

Reactive, signature based IDPS technology is one of the many methodologies used to detect attacks. In a signature based IDS, a misuse detection identifies intrusions by watching for patterns of traffic and compare them against observed events or a database of signatures from known threats. Reactive IDS/IPS, on the other hand, will not only detect and alert malicious traffic but also take pre-defined proactive actions. Using MRTG, Ntop, and SNMPC in routers will monitor traffic and help network managers easily see issues like DOS attacks and security problems.


The correct answer for this question is this one: "anomaly, network." Using MRTG, Ntop, and SNMPC to collect flow data from your routers and switches to identify traffic/packet anomalies is an example of an Anomaly, Network-based IDS/IPS.