1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andreyy89
3 years ago
14

What are the main differences between a workgroup and a domain?

Computers and Technology
2 answers:
olga nikolaevna [1]3 years ago
6 0

Answer:

The difference lies on how the network and resources are managed.

Explanation:

Computers on a network can be part of of work group or a domain. However, the two are different. This is seen in the following:

In a work group:

  • All computers are peers, no computer controls the other.
  • each computer has different user accounts.
  • no more than twenty computers
  • all computers are on the same local area network

On the other hand, in a domain:

  • one or more computers are severs
  • users  need to have unique domains
  • can be hundreds and thousands  of computers
  • computers are on different local networks
Juliette [100K]3 years ago
3 0

Answer:

The main differences are: escale (number of computer involved), level of security, location of computers and the presence of a network administrator.

Explanation:

  • A workgroup is a basic network infrastructure with slack security control and no central controlling administrative center, is the cheapest setup for a local in-house network, they usually involve less than 20 computers. In this kind of network all computers are peers, they have a set of user accounts and to log in you must have an account. All computers must be on the same local network or subnet.  
  • A domain, on the other hand, is more complicated and suitable for large businesses with many computers like a university structure or the structure within the Microsoft Corporation, in a domain security and sharing of data is significantly bigger, network administrators use servers to control the security and permissions for all computers on the domain.  There can be thousands of computers in a domain and they can be on different local networks.

I hope you find this information useful and interesting! Good luck!

You might be interested in
Sarah used a grid to create this layout for a website. Which rule of composition did Sarah use for the grid?
Nana76 [90]

Answer:

B rule of thirds

Explanation:

4 0
3 years ago
Read 2 more answers
The city government of Los Angeles recently upgraded its information technology infrastructure​ and, for the first​ time, implem
Maru [420]

Answer:

The correct answer to the following question will be Option A (Open source software).

Explanation:

It's a type of software which is open to all we can download that software by the free of cost. Wamp, Apache server is one of the example of the open source software.

Any software accessible for alteration which is circulated because of its source code is known as Open source software. Open source permissions influence the way technology is used, researched, updated, and circulated by individuals. In fact, it give permission to code users for using this software for whatever use might desire.

Which ensures it includes a developer authorization to modify the script in any manner they want to:

  • Developers will patch glitches.
  • Change features.
  • Modify the app to suit their needs.

No other software available for the alteration is available in the option. So, the proper answer is Option A.

8 0
3 years ago
A computer program that enables users to create and work with files and folders is called what?
murzikaleks [220]

Answer:

File manager

Explanation:

From the list of options 1 to 4, only option (2) is correct

Explaining the options one after the other

  • Web browser: It lets users access the internet
  • File Manager: Used to create and manage files/folders
  • User Interface: Means which the user of a computer interacts with the computer
  • File Reader: Used to read the content of a file. e.g. Adobe reader for pdf files, Notepad for text files, etc.

Having explained the options one after the other, <em>the file manager </em>is the answer to this question.

3 0
3 years ago
Read 2 more answers
In how many ways can the letters of the word APPROXIMATION be arranged?
ZanzabumX [31]

Answer:

2494800

Explanation:

A lot of math and time.

5 0
3 years ago
Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identi
kvasek [131]

Answer:

B. Intrusion Detection Software (IDS)

Explanation:

An Intrusion Detection Software (IDS) is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the main function of an IDS  product is to warn you of suspicious activity taking place − not prevent them. An IDS essentially reviews your network traffic and data and will identify probes, attacks, exploits and other vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an alert, logging the event or even paging an administrator. In some cases the IDS may be prompted to reconfigure the network to reduce the effects of the suspicious intrusion.

3 0
3 years ago
Other questions:
  • Remy’s manager has asked him to change the background color scheme from reds to blues in the standard template the company uses
    15·2 answers
  • HURRY!! Ill give brainily and 25 points. Describe how Scent is related to the culture and historical period when it was created.
    15·1 answer
  • Boolean expressions are named after ____
    9·1 answer
  • Jenny is working on a laptop computer and notices that the computer is not running very fast. She looks and realizes that the la
    14·1 answer
  • dr. olson likes to conduct research on the nature of prejudice and its effect on behavior. dr olson is probably a (n) - psycholo
    8·2 answers
  • I need help with workplace safety systems please help
    10·1 answer
  • What is an Operating System ??
    7·1 answer
  • On the Format tab, which group allows you to select a different font for a chart?
    7·2 answers
  • PLZ ANSWER QUICKLY!!
    12·1 answer
  • You must configure a certificate authority on your network to use EFS. True or False?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!