Documenting findings, actions, and outcomes of network troubleshooting calls is an essential part of the troubleshooting process. List the reasons why documentation is critical, and discuss the form that this documentation could take (e.g. blogs, wikis, professional document management software, etc). Include a detailed description of what information would need to be saved.

Answers

Answer 1

Answer:

The main purpose of documentation is for future reference on the cost, materials, procedures, and techniques used in a task. It can be in form of a video log, report, digital text document or software, etc.  

Explanation:

Documentation is an important practice of taking notes of events during a process. It could in the process of creating or discovering new ideas or repair or management of existing processes. It holds the time, cost, technique, event name, measures-taken, etc, that would totally describe the event.


Related Questions

A part-time job performed while in high school must have the approval of your school counselor.
False
True

Answers

Answer:

False, it only needs approval of your parents/guardian

May I have brainliest please? :)

Answer:

False

Explanation:

Write a program that calculates the average of N integers. The program should prompt the
user to enter the value for N and then afterward must enter all N numbers. If the user enters a
negative value for N, then an exception should be thrown (and caught) with the message “ N
must be positive.” If there is any exception as the user is entering the N numbers, an error
message should be displayed, and the user prompted to enter the number again.

Answers

Answer:

def Average(num):

   if num == 0:

       return 0

   val = 0

   trueNum = num

   for i in range(0, num):

       try:

           val += int(input("Enter value (%d out of %d): " % (i+1,num)))

       except Exception as e:

           print ("Error processing value. Non integer detected.")

           try:

               val += int(input("Enter value (%d out of %d): " % (i+1,num)))

           except Exception as e:

               print ("Error processing value. Non integer detected.")

               print ("OMITTING value from average.")

               trueNum -= 1

   return val/trueNum

def main():

   try:

       num = int(input("Enter a value N for amount of items: "))

       if num < 0:

           raise(ValueError)

   except ValueError:

       print ("N must be positive integer.")

       exit(1)

   print("Average: ", Average(num))

   exit(0)

if __name__ == "__main__":

   main()

Explanation:

This program is written in Python to collect some integer value from the user as an upper bound of integers to be input for an average.  Using this upper bound, the program checks to validate it is indeed an integer.  If it not an integer, then the program alerts the user and terminates.  If it is a user, the Average function is called to begin calculation.  Inside the Average function, the user is prompted for an integer value repeatedly up until the upper bound.  Using the sum of these values, the program calculates the average.  If the user inputs a non integer value, the program will alert the user that the value must be an integer and ask again.  If the user again inputs a non integer value, that iteration will be omitted from the final average.  The program this prints the calculated average to the user.

Cheers.

Internet Explorer inserts the Flash Shockwave Player as a(n) ____ control. Group of answer choices AVI ActiveX Class Quicktime

Answers

Answer:

Internet Explorer inserts the Flash Shockwave Player as a(n) ____ control.

ActiveX

Explanation:

ActiveX controls are small apps, also called “add-ons,” that allow websites to provide content such as videos and games. They also enable web interaction, make browsing more enjoyable, and allow animation. However, these ActiveX controls can sometimes malfunction, produce unwanted contents, or install spyware in your system because they exercise the same level of control as the computer user.

Write a test program that prompts the user to enter a two dimensional array and displays the location of the smallest element in the array.

Answers

Answer:

def element_loc():

   is_end = 'n'

   dimen2 = []

   while is_end == 'n':

       par1 = input("Enter rows and columns: ").split(",")

       part = [int(i) for i in par1]

       dimen2. append(part)

       is_end = input("Do you want to add more rows? y/n: ")

   mini = list()

   for i in dimen2:

       mini. append(min(i))

   result = min(mini)

   row_index = mini. index(result)

   col_index = dimen2[row_index]. index(result)

   print("Row: ", row_index, "Col_index: ", col_index)

element_loc()

Explanation:

The python program solution above prompts users for the two-dimensional array and then the rows of the array are compared with the minimum value stored in another list or array. The row index and the column index are gotten from the mini and dimen2 arrays respectively and are displayed as the position of the minimum value in the two-dimensional array.

Which of the following examples requires a citation in a paper you're writing?
A. General information you already knew but want to clarify or conform
B. The table of contents
C. A paraphrasing of your original work in a different section of your paper
D. A direct quotation that is marked off by quotation marks

Answers

Answer:

D. A direct quotation that is marked off by quotation marks

Explanation:

Quotation marks are responsible for indicating that some texts are explicitly referenced in a paper with no changes made. This type of quote must be very well referenced in the paper, both on lines where the quotes are written with author's surname, date of publishing, page referenced, and also on the bibliography at the end of the paper with all these references very well detailed, including text's title, translators (if any), number of editions, publishing house, and more. It is important to highlight it depends on the policies of publishing the paper must follow because there are different patterns for referencing and quoting.

Define a toString prototype method that returns the cat's name, gender, and age separated by semicolons.

Answers

Answer:

Following are the program to this question:

import java.util.*;//import package for user input

public class Main//defining main class

{

public static String Cat (String name, String gender, int age)//defining string method Cat that accept parameter value

{

return name + ';' + gender + ';' + age;//return parameter value

}

public static void main(String[] args) //defining main method

{

   String name,gender;//defining String variable

   int age;//defining integer variable

   System.out.println("Enter name, gender and age: ");//print message

   Scanner obx=new Scanner(System.in);//creating Scanner class object for user input

   name=obx.next();//input name value

   gender=obx.next();//input gender value

   age=obx.nextInt();// input age value

   System.out.println(Cat(name,gender,age));//print return method value

}

}

Output:

Enter name, gender and age:  

dani

Female

12

dani;Female;12

Explanation:

In the above-given code, a string method Cat is declared, that accepts three variable "name, gender, and age", inside the method return keyword is used that returns the parameter values.

In the main method, the above parameter variable is declared, which is used to input value from the user-end, and used the print method to print its return value.

If you have 128 oranges all the same size, color, and weight except one orange is heavier than the rest. Write down a C++ Code/Algorithm to search the heavy orange, in how many steps would you be able to find it out?

Answers

Answer:

#include <iostream>

using namespace std;

void Search_heavy_orange(int arr[], int l, int r, int x)

{

int count = 0, m = 0;

while (l <= r) {

 m = l + (r - l) / 2;

 // Check if x is present at mid

 if (arr[m] == x) {

  count++;

 }

 // If x greater, ignore left half

 if (arr[m] < x) {

  l = m + 1;

  count++;

   

 }

 

 // If x is smaller, ignore right half

 else {

  r = m - 1;

  count++;

 }

}

cout << "............For Worst Case......." << endl;

cout << "Orange with heavy weight is present at index " << m << endl;

cout << "Total number of step performed : " << count << endl;

}

int main()

{

// Assuming each orange is 100 gm and the weight of heavy

// orange is 150 gm

int orange_weight[128];

for (int i = 0; i < 127; i++) {

 orange_weight[i] = 100;

}

// At worst case the heavy orange should be at last position

// inside the basket : 127

orange_weight[127] = 150;

// We will pass array , start index , last index and the search element

// as the parameters in the function Search_heavy_orange

Search_heavy_orange(orange_weight, 0, 127, 150);

return 0;

}

Explanation:

explain the main components of a computer system​

Answers

Answer:

A motherboard.

A Central Processing Unit (CPU)

A Graphics Processing Unit (GPU), also known as a video card.

Random Access Memory (RAM), also known as volatile memory.

Storage: Solid State Drive (SSD) or Hard Disk Drive (HDD)

Explanation:

They all work together to create a system

Code used when creating a hyperlink to a specific part of the same page.

Answers

Answer:

Give The Object Or Text You'd Like To Link To A Name.

Take That Name That You've Chosen, And  Then Now Insert It To An Opening HTML Anchor Link Tag.

Place That Complete Opening <a> Tag From Before The Text Or Object You Want To Link It To, Then Now Add A Closing </a> tag after.

(Hope this is correct and hope this helped. Sorry if I'm wrong and you get this wrong)

URGENT


You are an art director working for a feature film studio. Create a set for an interior scene of your choosing. Write a description of your scene to give to the principal production team. Include details that an art director would focus time and energy on. Include other production team members with whom you would collaborate. Your description should be at least 150 words.

Answers

Looks Like That’s Something You’d Have To Do On Your Own

ong answer, but make sure to provi
you
reasoning
Sales Company:
W.D. Widgets is a small company that sells widgets. They're mostly made up of salespeople who work with lots of clients.
You've taken over as the sole IT person for this company of 80-100 people.
R teils you to provision a machine for a new employee, you order the hardware directly from a business vendor.
You keep one or two machines in stock, in case of emergency. The users receive a username that you generate for them.
You then give them an orientation on how to login when they start. You currently manage all of your machines using
Windows Active Directory. The company uses only Windows computers. When a new computer is provisioned, you have
to nistallots of sales-specific applications manually onto every machine. This takes a few hours of your time for each
15
machine. When someone has an IT-related request, they email you directly to help them.
Almost all software is kept in-house, meaning that you're responsible for the email server, local machine software, and
instant messenger. None of the company's services are kept on the cloud.
Customer data is stored on a single file server. When a new salesperson starts, you also map this file server onto their
local machine, so that they can access it like a directory. Whoever creates a folder on this server owns that folder and
everything in it. There are no backups to this critical customer data. If a user deletes something, it may be lost for
everyone.

Answers

Answer:

Umm just go what your gut tells you to do

Explanation:

Describe one practical application of total internal reflection. ​

Answers

Answer:

The phenomenon of total internal reflection of light is used in many optical instruments like telescopes, microscopes, binoculars, spectroscopes, periscopes etc. The brilliance of a diamond is due to total internal reflection. Optical fibre works on the principle of total internal reflection.

Explanation:

thank me later but if it wrong. sorry

Many electronic devices use a(n) ?, which contains all the circuit parts in a miniature form.

Answers

Answer:

An integrated circuit is a single, miniature circuit with many electronically connected components etched onto a small piece of silicon or some other semiconductive material. (A semiconductor is a nonmetallic material that can conduct an electric current, but does so rather poorly.)

Explanation:

Many electronic devices use a(n) integrated circuit which contains all the circuit parts in a miniature form.

The use of  integrated circuit is known to be a kind of a single, miniature circuit that has a lot of electronically connected parts that are designed onto a small piece of silicon or semi conductive material.

A lot of electronic components are known to be capacitors, inductors, resistors, diodes, transistors and others.

Learn more about electronic devices from

https://brainly.com/question/11314884

Professor Gig A. Byte needs to store text made up of the characters A with frequency 6, B with frequency 2, C with frequency 3, D with frequency 2, and E with frequency 8. Professor Byte suggests using the variable length codes:
Character Code
A 1
B 00
C 01
D 10
E 0
The professor argues that these codes store the text in less space than that used by an optimal Huffman code. Is the professor correct?

Answers

Answer:

This is not true

Explanation:

The optimal Huffman code is used to encrypt and compress text files. It uses fixed-length code or variable-length code for encryption and compression of data.

The professor's character code is similar to Huffman's variable-length coding which uses variable length od binary digits to represent the word strings. The file size of the text file above is;

= 6 x 1 + 2 x 2 + 3 x 2 + 2 x 2 + 8 x 1 = 28 bits

This would be the same for both cases.

The encrypt would be the problem as the encoded and decoding of the characters B and E may cause an error.

Write two statements that each use malloc to allocate an int location for each pointer. Sample output for given program:
numPtr1 = 44, numPtr2 = 99
#include
#include
int main(void) {
int* numPtr1 = NULL;
int* numPtr2 = NULL;
/* Your solution goes here */
*numPtr1 = 44;
*numPtr2 = 99;
printf("numPtr1 = %d, numPtr2 = %d\n", *numPtr1, *numPtr2);
free(numPtr1);
free(numPtr2);
return 0;
}

Answers

Answer:

#include <stdio.h>

#include <stdlib.h>

int main(void) {

   int* numPtr1 = NULL;

   int* numPtr2 = NULL;

   /* Your solution goes here */

   numPtr1 = (int *) malloc(10);

   numPtr2 = (int *) malloc(20);

   *numPtr1 = 44;

   *numPtr2 = 99;

   printf("numPtr1 = %d, numPtr2 = %d\n", *numPtr1, *numPtr2);

   free(numPtr1);

   free(numPtr2);

   return 0;

}

Explanation:

The C library malloc function is used to assign memory locations (in bytes) to variables. It accepts the size parameter and returns a pointer to the specified variable location.

The two malloc statements above assign two memory locations 10 and 20 to the numPtr1 and numPtr2 integer variables respectively.

To prevent long page load times for pages containing images, it is best to use a compressed file format such as JPG, as well as appropriate image dimensions and
resolution.
magnification.
orientation.
colors.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The given options to this question are:

resolution. magnification. orientation. colors.

The correct option to this question is 1. i.e.

Resolution.

The resolution of an image determines how many pixels per inch an image contains. Image having a higher resolution takes long page load times for a page and lower resolution takes less page load time. So, to prevent long page load times for pages containing images, it is best to use compressed file formation as well as appropriate image dimension and resolution.

While other options are not correct because:

Magnification, orientation, and color does not affect the page load time. Page load time for images only affected by the dimension and resolution of the images.

Write a recursive function that accepts two arguments into the parameters x and y. The function should return the value of x times y. Hint: multiplication can be performed as repeated addition. Test your recursive function by prompting the user to enter values for x and y and then displaying the result. Your function should be able to handle multiplication of negative values.

Answers

Answer:

In Python:

def times(x,y):

     if y<0:

           return -1*times(x,y*-1)

     if y == 1:

           return x

     return x + times(x,y-1)

x = int(input("x: "))

y = int(input("y: "))

print(times(x,y))

Explanation:

I answered the question using Python3

This defines the function

def times(x,y):

This checks for negative values

     if y<0:

           return -1*times(x,y*-1)

This is the base case where y = 1

     if y == 1:

If true, the value of x is returned

           return x

This returns the recursion and it is repeated until the base case is achieved

     return x + times(x,y-1)

This prompts user for x value

x = int(input("x: "))

This prompts user for y value

y = int(input("y: "))

This calls the recursion and also prints the result

print(times(x,y))

Select all examples of proper keyboarding technique.

Look at the keys while keyboarding.
Keep your hands higher than your elbows.
Sit up straight.
Relax your fingers.
Aim to make no mistakes.

Answers

Answer:

all except keeping your hands higher than your elbows

Answer:

Sit up straight.

Relax your fingers.

Aim to make no mistakes.

Explanation:

A switch is a device that connects multiple computers into a network in which multiple communications links can be in operation simultaneously. True False

Answers

Answer:

True

Explanation:

A network switch is also called switching hub or a bridging hub. It is a device that connects multiple computers into a network in which multiple communications links can be in operation simultaneously. It makes use of Mac addresses in the forwarding of the data link layer (layer 2) of the OSI model. Types include managed switches, unmanaged switches, smart switches but to mention a few.

A backup can be installed that costs​ $100. What is the minimum allowable reliability for the backup that would make installing it​ worthwhile? The minimum allowable reliabilit​ = nothing​%

Answers

Answer:

0.95

Explanation:

Reliability is a assurance that a machine would have an efficiency of one or close to one.

The minimum allowable reliability R;

(1 - R) x 2000 = 100

Make R the subject of the formula;

R = 1 - (100/ 2000)

R = 1 - 0.05

= 0.95

Do you think GE will become one of the top 10 U.S. software companies? Why or why not?

Answers

Answer: I do belive GE will be one of the top 10 software companies because each year the software side of GE is growing 20 perecnt per year which is a big deal!

Explanation:

There are different kinds of firms. I think GE will become one of the top 10 U.S. software companies. The world is gradually turning to the production of electric cars and much more appliances and with this, I believe they would grow to the top 10 in no time.

General Electric Company (GE) is known to be one of the top American multinational conglomerate that is seen in New York State.

It has its headquartered in Boston and thy have been ranked 33rd in the 2020 ranking, among the Fortune 500 in the United States using their gross revenue.

Learn more about General Electric Company from

https://brainly.com/question/26379157

g 'write a function that takes as input a list and outs a new list containing all elements from the input

Answers

Answer:

def mylist(*args):

   return args

new_list = mylist(2,3,4,5)

Explanation:

The simple python code above defines a function called mylist that receives multiple length of element as a list and returns the list a new list. The "*args" allows the function to receive any number of item and converts them to a list that is returned in the next statement.

The can also be achieved by simply assigning a squared bracket enclosed list to the variable or with the list() constructor.

write passage on computer virus​

Answers

In more technical terms, a computer virus is a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code.

Answer:

A computer virus is a relatively small program that attaches itself to data and program files before it delivers its malicious act. There are many distinct types of viruses and each one has a unique characteristic. Viruses are broken up into to main classes, file infectors and system or boot-record infectors.

hope it helps

hello hello . please help me​

Answers

Answer:

#include <iostream>  

using namespace std;  

int main()  {  

 int num, check=0;  

 for(int num = 1; num<=100;num++){

for(int i = 2; i <= num/2; i++)  {

     if(num % i == 0)   {  

         check=1;  

         break;         }     }  

 if (check==0)  {       cout <<num<<" ";     }

 check = 0;

 }

 return 0;  

}

Explanation:

This line declares num as integer which represents digits 1 to 100.

A check variable is declared as integer and initialized to 0

 int num, m=0, check=0;  

This for loop iterates from 1 to 100

 for(int num = 1; num<=100;num++){

This iterates from 2 to half of current digit

for(int i = 2; i <= num/2; i++)  {

This checks for possible divisors

     if(num % i == 0)   {  

If found, the check variable is updated to 1

         check=1;  

And the loop is terminated

         break;         }     }  

The following if statement prints the prime numbers

 if (check==0)  {       cout <<num<<" ";     }

 check = 0;

 }

A free-frame list Select one: a. is a set of all frames that are used for stack and heap memory. b. is a set of all frames that are currently unallocated to any process. c. is a set of all frames that are filled with all zeros. d. is a set of all frames that are currently being shared by at least two processes.

Answers

Answer:

b. is a set of all frames that are currently unallocated to any process

Explanation:

The free frame list is the list that used for all kind of the frames that presently non-allocated to any kind or process

Therefore as per the given situation, the correct option is b as it fits to the current situation

Hence, all the other options are wrong

So, only option b is correct

The same is to be considered

Answer:

b. is a set of all frames that are currently unallocated to any process.

Gabby needs to perform regular computer maintenance. What should she do? Check all that apply.

Answers

what are the options ???????????

Answer:

all of them but B

Explanation:

Correct on edge

What kind of number is 36A

Answers

Rational
or compound what form are you looking for?

high level languages are closer to machine language than humans yes or no​

Answers

they are closer to human languages and further from machine so, no.

Answer:

yes

Explanation:

because they were built from humans

Asymmetric encryption uses only 1 key.

A)
False

B)
True

Answers

A.) false

Symmetric encryption uses a single key that needs to be shared among the people who need to receive the message while asymmetric encryption uses a pair of public key and a private key to encrypt and decrypt messages when communicating.
A) false is the answer

A .cache is made up of _____ , each of which stores a block along with a tag and possibly a valid/dirty bit

Answers

Answer:

Blocks

Explanation:

A .cache is made up of blocks, each of which stores a block along with a tag and possibly a valid/dirty bit.

Basically, each blocks that makes up the cache stores additional block and sometimes a bit.

Other Questions
Nitrogen is a critical component of what organic compounds? Giving everything. Plzzz help. 14. A pair of cars, 280 miles apart, begin at thesame time to run toward each other. If car A fromcity A runs at a rate that is 10 mph faster than carB from city B, and if they meet 2 hours later, howfar is the place they meet away from city A?Please help How many molecules are present in 3HNO4?1) 142) 183) 34) 4 1. The mass of the Earth is 81 times the mass of the Moon. Using Newton's Law of Gravity, what would the effect of gravitation be if the mass of the Moon were increased by four times and the distance between Earth and the Moon were cut in half? How does the tar in cigarettes affect the body? (A) It sticks to the tongue causing bad breath (B) It seeps down into the airway and lungs (C) It absorbs into the bloodstream (D) It attaches to the stomach lining 1) Dominant alleles are represented by a lily works daily in a library because she wants to be a writer one day. helppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppp WILL MAKE BRAINLEST PLS HELP Johnny filled a 5 gallon bucket with water. How many quarts of water does Johnny have? what is 9 percent of 30948 12. A term with multiplemeanings in Indian religionsand which relates to theprinciple of cosmic order.Please help 12) Which model of the atom is thought to be true?a. Protons, electrons, and neutrons are evenly distributed throughout the volume ofthe atom.b. The nucleus is made of protons, electrons, and neutrons.c. Electrons are distributed around the nucleus and occupy almost all the volume ofthe atom.d. The nucleus is made of electrons and protons. Which sentence uses correct capitalization? A. Sports Illustrated's May article "Too Brutal Or The Future?" focuses on mixed-martial arts. B. Sports Illustrated's May Article "too Brutal or the Future?" focuses on Mixed-Martial Arts. C. Sports Illustrated's May article "Too Brutal or the Future?" focuses on Mixed-Martial Arts. D. Sports Illustrated's May article "Too Brutal or the Future?" focuses on mixed-martial arts. the reason two atoms would form an ionic compound instead of a covalent compound mainly depends on their I NEED HELP !!!! A taxi driver spends $105 every week on gas for 6 weeks. What integer represents the effect of buying $105 on gas for 6 weeks on the taxi drivers bank account, in dollars? What angle pair relationship is shown?A Alternate InteriorB. Alternate ExteriorC. CorrespondingD. Same Side Interior In 2016, sports newscaster Erin Andrews and former wrestler Hulk Hogan were both awarded substantial monetary damages after winning their respective cases involving invasion of privacy. It is believed that the juries in both cases wanted to sanction the defendants by sending a clear message that individual's privacy must be respected regardless of who they are. The type of monetary damages awarded in these two cases are described as: Why do nonpolar substances tend to be gases and not liquids or solids?