1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oliga [24]
3 years ago
5

You have a large company, and it is important to your business that your employees' work is backed up regularly. Which network w

ould provide you with the most security?
Centralized
Client server
GUI
Peer-to-peer
Computers and Technology
1 answer:
valkas [14]3 years ago
3 0
Client server network as it has a powerful server which provides all the networks required on the network. Files are usually backed up regularly.

You might be interested in
Divide the difference of 47 and 23 by the difference of 25 &13​
OleMash [197]

Answer:

The answer is 2

Explanation:

3 0
2 years ago
What did early computers use to store each bit?
Damm [24]

Answer:

A vacuum tube

4 0
3 years ago
Read 2 more answers
HAVE A GOOD WEEK OFF PPL
dexar [7]

Answer:

thanks you too mah dude! :)

Explanation:

7 0
2 years ago
An example of financial irresponsibility
Nady [450]

An example of financial irresponsibility is driving without car insurance. The other options are examples of financial responsibility.

3 0
3 years ago
Oops, we made a mistake: we created a key "short" and gave it the value "tall", but we wanted to give it the value "long" instea
AnnZ [28]
Be consistent in whether you use single or double quotes to declare your strings: our autograder assumes you'll be consistent.
3 0
3 years ago
Other questions:
  • If you are trying to create a web page for your band and having difficulty creating links to other groups on your page, what is
    7·1 answer
  • What is the recommended secure protocol for voice and video applications? secure real-time transport protocol (srtp) hypertext t
    9·1 answer
  • . Database connectivity software is also known as:
    11·1 answer
  • Websites that group individuals and organizations into clusters or groups based on some sort are considered to be what type of n
    11·1 answer
  • Design a full adder circuit using NAND gates only (input : A, B, Cin and output = S, Cout).
    5·1 answer
  • Now you are ready to implement a spell checker by using or quadratic. Given a document, your program should output all of the co
    15·1 answer
  • Which of the following is the best description of the [Drive for] block?
    15·1 answer
  • Defination of formula bar​
    14·1 answer
  • What are 3 customizations that can be done using the header/footer section in the customize reports tray?.
    14·1 answer
  • When methods have ____, other programs and methods may use the methods to get access to the private data.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!