1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ira [324]
3 years ago
6

You have implemented a network where each device provides shared files with all other devices, what kind of network is it?

Computers and Technology
1 answer:
Reil [10]3 years ago
8 0

It is a Peer-to-peer type of network when you have implemented a network where each device provides shared files with all other devices.

So the answer is Peer-to-peer.

You might be interested in
The answer for 1 and 2
Mrrafil [7]
1. A.  It is basically the definition of a political cartoon.
2. D. They used newspaper, protesting, and marches.
<span />
6 0
4 years ago
What type of malicious software masquerades as legitimate software to entice the user to run it?
Vlada [557]

Answer:

Trojan horse

Explanation:

A Trojan horse is malicious software that masquerades as a legitimate computer program such as a video game, image file, utility program, or even an antivirus so as to entice the user to run it, thereby allowing an attackers (the developer of the malicious program) to gain access to the data on the computer in an illegal manner.

4 0
3 years ago
A video streaming website uses 32 bit integers to count the number of times each video is played. In anticipation of some videos
Over [174]

Answer:

c) 2^32 times as many values can be represented.

Explanation:

It's funny, this problem comes from a real-life situation, except it wasn't really foreseen :-)  And we will encounter a similar problem in less than 20 years.

The difference in terms of storage capacity from 32-bit integers and 64-bits integers is huge.

A 32-bit integer can store (signed) numbers up to 2,147,483,647. (so over 2 BILLIONS)

A 64-bit integer can store (signed) numbers up to 9,223,372,036,854,775,807 (9 BILLIONS of BILLONS)

5 0
3 years ago
Read 2 more answers
A hard drive that uses fde is often referred to as a(n) ____.
Sergio039 [100]

FDE stands for full disk encryption. FDE encrypts data as it is written to the disk and decrypt data as it is read off the disk. It is the simplest method of deploying encryption ,transparent to applications, databases, and users.

A hard drive that uses FDE is often referred to as a self-encrypting hard drive. correct answer: B

6 0
3 years ago
Terence creates software requirements specification (SRS) documents for various software development projects. In which phase of
Flura [38]

Terence is involved in the <u>design phase</u> of software development life cycle (SDLC).

<h3>What is SDLC?</h3>

SDLC is an acronym for software development life cycle and it can be defined as a strategic process (methodology) that defines the key steps, phases, and stages for the development and implementation of high quality software applications.

<h3>The phases of SDLC</h3>

Generally, there are six (6) main phases involved in the development of a software application and these include;

  • Planning
  • Analysis
  • Design
  • Development (coding)
  • Deployment
  • Maintenance

In this scenario, Terence is creating software requirements specification (SRS) documents and as such is involved in the design phase of software development life cycle (SDLC).

Read more on software development here: brainly.com/question/18369405

5 0
2 years ago
Other questions:
  • 1 what elements of composition are under your control in photoshop
    13·1 answer
  • 1. According to Rory's paycheck, he earned $800 last month, but before taxes and other deductions were
    12·1 answer
  • 5. The hazardous component in most antifreeze is _____, which is extremely toxic to humans and animals. A) Calcium Carbonate B)
    13·2 answers
  • Time complexity: Be sure to show your work. Suppose that a particular algorithm has time complexity T (n) = 10 ∗ 2n, and that ex
    7·1 answer
  • Which statement best describes a transition in PowerPoint?
    12·1 answer
  • 4-One possible performance multiplication enhancement is to do a shift and add instead of an actual multiplication. Since 9 * 6,
    12·1 answer
  • Using positive self talk is a great way to
    12·2 answers
  • Why is it preferable to code web pages in HTML format?
    10·2 answers
  • Can someone help me to write a python code to save list form python to CSV file please?​
    12·1 answer
  • Distinguish<br> between formal and Informal<br> Information System<br> Information systems
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!