1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vikentia [17]
2 years ago
5

1. Explain what peer to peer networking is.

Computers and Technology
1 answer:
timurjin [86]2 years ago
3 0
<h3>Peer-to-peer networking</h3>

Peer-to-peer networking is a term used to describe a system of communication that allows a group of computers to exchange information in a permissionless way.

One pro of -peer-to-peer networking is that it decentralizes how information is transferred and secured since files are stored on just a single device.

On the other hand, a con of peer-to-peer networking is the possible exposure to harmful data such as malware. been transferred from another computer.

You can learn more about peer-to-peer networks from a similar question here brainly.com/question/1932654

#SPJ1

You might be interested in
The decimal system was invented by the ____ empire.
AnnZ [28]

Answer:

A. Gupta Empire

Explanation:

One of its accomplishments in mathematics, was the discovery of the decimal system and zero as a placeholder, based on the number 10 (similar to what we use nowadays). it was discovered by a mathematician and astronomer named Aryabhatta around 498 CE.

7 0
3 years ago
Write a function called add_tuples that takes three tuples, each with two values, and returns a single tuple with two values con
Leni [432]

In Python, tuples are indeed a data structure that also stores an ordered sequence of unchanging values, and following are the Python program to the given question:

Program Explanation:

  • Defining a method "add_tuples" that takes three variables "firstTuple, secondTuple, thirdTuple" into the parameter.
  • After accepting the parameter value a return keyword is used that adds a <em><u>single tuple with two values</u></em> and returns its value into the form of (x,y).
  • Outside the method, two print method is declared that calls the above method by passing value into its parameters.

Program:

def add_tuples(firstTuple, secondTuple, thirdTuple):#defining a method add_tuples that takes three variable in parameters

   return firstTuple[0]+secondTuple[0]+thirdTuple[0],firstTuple[1]+secondTuple[1]+thirdTuple[1] #using return keyword to add value

print(add_tuples((1,4), (8,3), (14,0)))#defining print method that calls add_tuples method takes value in parameters

print(add_tuples((3,2), (11,1), (-2,6)))#defining print method that calls add_tuples method takes value in parameters    

Output:

Please find the attached file.  

Learn more:

brainly.com/question/17079721

4 0
3 years ago
Which of the following criteria was a key milestone for the object-relational model created in the mid-1980s?
gladu [14]

The use of the inheritance to have a structure inherit attributes and methods of classes above it.


One of the key milestones in the period in which the object-relational model was created was the creation of a data
model that closely represented the real world. In this approach, objects were created in which both data and its
relationships were all contained in one place. These data models were becoming a norm to be stored on the web. They
also incorporated support for star schemas within data warehouses. Objects that had similar characteristics were
grouped into classes, where they had a shared structure of attributes and behaviors.

3 0
2 years ago
Sequence encryption is a series of encryptions and decryptions between a number of systems, wherein each system in a network dec
valentina_108 [34]

Answer:

The answer is True.

Explanation:

In a Network data transfer, it is essential for the security purpose that data should be in encrypted form which an unreadable form and it will be decrypted when it reaches the destination system.

It is important for the organization to encrypt data to make it safe from hackers and cryptographic technology is used in data Sequence encryption.

There is a key that is used to decrypt data in the network system and encryption and decryption is a sequential process for the data starting from the initial system and ending in the destination system.

3 0
3 years ago
The principal objectives of computer security are to prevent unauthorized users from gaining access to resources, to prevent leg
Lena [83]

Answer:

True is the correct Answer for the above question.

Explanation:

  • Computer security is a security in which data of the computer is secured from the access of unauthorized users. It is primarily achieved to stop the access grant to the unauthorized user.
  • It means that there is an authorization point which decides that the user is authorized or not. If the user is authorized then only he can enter the system otherwise he can not able to enter the system.
  • It helps to secure the data and the data is the important point of the computer system.
  • The question also states the same which is described above. Hence true is the correct answer.

3 0
3 years ago
Other questions:
  • What name are input devices, output devices, and auxiliary storage devices collectively known?
    9·1 answer
  • Dwight <br> d. eisenhower was impressed with germany's network of highways and how it __________.
    15·1 answer
  • Which educational qualification would help a candidate get a job as a computer systems engineer? a.certificate
    6·1 answer
  • Which type of operating system is usually used in personal computers
    13·1 answer
  • Zahra's softball team needs money for team T-shirts. The coach makes some fundraising suggestions, while team members brainstorm
    5·2 answers
  • What is the device that is non-volatile sometime called external memory?<br>​
    15·1 answer
  • How do you use switch board in the office​
    6·1 answer
  • The base class Pet has private fields petName, and petAge. The derived class Dog extends the Pet class and includes a private fi
    6·1 answer
  • Read the steps in the process of making a video.
    5·2 answers
  • How communication skills are different from self management skills
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!