1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lora16 [44]
3 years ago
10

Networking Gadgets, Inc. currently employs eight people but plans to hire 10 more in the next four months. Users will work on mu

ltiple projects, and only users assigned to a project should have access to the project files. You’re instructed to set up the network to make it easy to manage and back up, yet still provide centralized storage for project files. Would you choose a peer-to-peer network, a server-based network, or a combination? Why?
Computers and Technology
1 answer:
grandymaker [24]3 years ago
3 0

Answer: Server based network

Explanation:

 The server based network is the type of network in which the special type of computer mainly handle the various networking tasks like the storing file, managing printers and authenticate the users in the system. The server based network are also responsible for run various types of application like the email and the database system.

The microsoft windows 2016 and the window 2012 are the two ideal OS (Operating system) that mainly used in the server based network.

Therefore, we use the server based network as it easy to backup and manage in the networking system.

You might be interested in
What is the difference between a rendering engine and a browser engine?
Vlada [557]

Answer:

D) A rendering engine displays content on the screen and a browser engine coordinates user interface interactions.

Explanation:

The rendering engine will deal with all the HTML code and will generate an output based on its own rules for interpreting the code.  That's why different rendering engines will have different renditions of the same given HTML code. You can notice that in the acceptance of HTML5 and CSS3 tags, which are not universal yet.

The browser engine will deal with the user interface and all other features that make a browser a browser, relying on the rendering engine for the display.

That duality allows different browsers to use the same rendering engine, thus have similar outputs.

7 0
3 years ago
Read 2 more answers
How many nibbles make one kilobyte​
Kazeer [188]
2000 nibbles I think correct me if I’m wrong
5 0
3 years ago
Read 2 more answers
What is out put.what is data. what is microprocessor
adelina 88 [10]

Answer:

Data is raw or unorganized facts

Explanation:

If something outputs something, it means it brings out something

7 0
3 years ago
3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All
ELEN [110]

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

7 0
3 years ago
MCQ: Which of the following network is confined to a relatively small area?
kobusy [5.1K]

Answer:

<em>D Lan</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em>

3 0
2 years ago
Read 2 more answers
Other questions:
  • You can click a web page title on the _____ list to return to that page.
    10·1 answer
  • Cloud resources are​ ________ because many different organizations use the same physical hardware.
    12·1 answer
  • WHEN COPYING EXISTING SPREADSHEET DATA TO A WORD DOCUMENT YOU NEED TO SELECT?
    12·1 answer
  • A structure that specifies which of a number of permitted data types (e.g. integers) that may be stored in its instances is:
    6·1 answer
  • How do you reduce computer screen flicker
    11·1 answer
  • How can you crop a photo in PowerPoint?
    15·2 answers
  • Design a program that asks the user to enter a string containing a series of single digit numbers with nothing separating them.
    7·1 answer
  • Rewritable (write, erase, write again) is known as _______.
    7·1 answer
  • A security administrator plans to conduct a vulnerability scan on the network to determine if system applications are up to date
    15·1 answer
  • PLEASE HELP! I accidently looked up a link, and now this same link keeps popping up everywhere, how do I stop this!?!? please he
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!