Answer:
Software reuse is the technique through which updating the software system through the already defined components or assets of the software.This helps in increasing the productivity ,cost decrement , quality improvement etc.
But in actual case, the software reuse still persist high cost due to modification of inflexible designing of software .It also costs more than expected for the maintenance and training of software.
The security of the software is always at risk because of the usual and advanced hacking and attacking by the hackers even when the protect of software is high.Thus, these statements verify that the benefits of cost and security of software is not actually realized.
Answer:
Light Grey.
Explanation:
I guess because mostly I have seen document background colour is Grey.
False,
The apple was not a computer
One of the disadvantages of a server-based network compared to a peer-to-peer network is: 1) Additional costs.
<h3>What is a server?</h3>
A server can be defined as a dedicated computer system that is designed and developed to provide specific services to other computer devices or programs, which are commonly referred to as the clients.
<h3>Types of server.</h3>
In Computer technology, there are different types of server and these include the following:
- Web server
- Email server
- File server
- Database server
- Proxy server
<h3>What is a
Peer to Peer (P2P) Network?</h3>
In Computer networking, a Peer to Peer (P2P) network can be defined as a type of network that are designed and developed to connect similar computers that share data and software with each other at lesser cost in comparison with other network service.
In this context, we can infer and logically deduce that one of the disadvantages of a server-based network compared to a peer-to-peer network is additional costs.
Read more on Peer to Peer Networks here: brainly.com/question/1932654
#SPJ1
Complete Question:
What is one of the disadvantages of a server-based network compared to a peer-to-peer network?
1) Additional costs
2) none of these choices
3) Decentralized data access
4) Less secure
5) Difficult to expand