Answer:
First and foremost, what is network architecture? It's basically the physical and logical design which refers to the software, hardware, protocols and the media of transmission of data. Simply put, it refers to how computers are organized and how tasks are allocated among these computers. The two types of widely used network architectures are peer-to-peer aka P2P and client/server aka tiered.
Peer-to-Peer Architecture
In a peer-to-peer network, tasks are allocated to every device on the network. Furthermore, there is no real hierarchy in this network, all computers are considered equal and all have the same abilities to use the resources available on this network. Instead of having a central server which would act as the shared drive, each computer thats connected to this network would act as the server for the files stored on it.
Answer:
You tell her that a <u>CD R</u> is an erasable multi session disc users can write on multiple times.
Answer:
Hackers can snoop on data sent over your network.
Hackers can use your network to access your computer's files and system information.
Explanation: Unsecured Wireless connections are wireless connections which are have no passwords they are open to the general public,such networks can be very risky to use as it gives easy access to dishonest persons who can manipulate that opportunity to SNOOP ON DATA SENT OVER YOUR NETWORKS. They can use this hacking to fraudulently steal from your bank account and obtain your private information.
It is called SPIM (Spam over Instant Messaging). You also have email SPAM and SPIT (Spam over Internet Telephony, which means using the internet to make phone calls.
Answer:
Logic Classes
Explanation:
There are three classes in a three-tiered architecture, which are:
1) Presentation classes
2) Logic Classes
3) Data Classes
Hence, the middle layer is the Logic classes.