1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andreyy89
3 years ago
14

What are the main differences between a workgroup and a domain?

Computers and Technology
2 answers:
olga nikolaevna [1]3 years ago
6 0

Answer:

The difference lies on how the network and resources are managed.

Explanation:

Computers on a network can be part of of work group or a domain. However, the two are different. This is seen in the following:

In a work group:

  • All computers are peers, no computer controls the other.
  • each computer has different user accounts.
  • no more than twenty computers
  • all computers are on the same local area network

On the other hand, in a domain:

  • one or more computers are severs
  • users  need to have unique domains
  • can be hundreds and thousands  of computers
  • computers are on different local networks
Juliette [100K]3 years ago
3 0

Answer:

The main differences are: escale (number of computer involved), level of security, location of computers and the presence of a network administrator.

Explanation:

  • A workgroup is a basic network infrastructure with slack security control and no central controlling administrative center, is the cheapest setup for a local in-house network, they usually involve less than 20 computers. In this kind of network all computers are peers, they have a set of user accounts and to log in you must have an account. All computers must be on the same local network or subnet.  
  • A domain, on the other hand, is more complicated and suitable for large businesses with many computers like a university structure or the structure within the Microsoft Corporation, in a domain security and sharing of data is significantly bigger, network administrators use servers to control the security and permissions for all computers on the domain.  There can be thousands of computers in a domain and they can be on different local networks.

I hope you find this information useful and interesting! Good luck!

You might be interested in
You are part of the team assigned to implement new software at XYZ Inc. The employees at XYZ Inc. trust the results obtained fro
Ad libitum [116K]

There are different kinds of software implementation strategy. The software implementation strategy would you recommend in this situation to allow users fall-back access to the old system as the new one is implemented is parallel start up.

  • Parallel running often called parallel start up strategy for system changeover where a new system slowly takes over the roles of the older system even when both systems operate.

This conversion often occur when the technology of the old system is outdated and as such a new system is needed to be installed to replace the old one.

The parallel running phase is the act of changing a fragment of business information technology operation to a new system.

Learn more about Parallel start up from

brainly.com/question/9343211

7 0
2 years ago
Who knows a website that can connect videos in your phone
Arte-miy333 [17]
Get a screen recorder then record all the videos u wanna save then u can go back and watch them wenever u want to
5 0
3 years ago
Select the correct answer.
lisov135 [29]

Answer:

D. Prepare the content

Explanation:

Before Jennifer starts designing the website she has to prepare content for the website

5 0
2 years ago
Read 2 more answers
Which statement best justifies the use of a high-speed cache in a CPU?
crimeas [40]

Cache memory is a high-speed memory that stores the instructions and data that have been frequently accessed.  It decreases the time it takes to decode the instructions stored in the instruction pipeline.

A.  It decreases the time it takes to decode instructions stored in the instruction pipeline.

<u>Explanation:</u>

Whenever an instruction is invoked or some data is accessed, the CPU looks for it in the cache memory before accessing the main memory.

If the content is found in the cache memory, it accessed from there and then and hence the access time and decode time is reduced as there were no main memory lockups.

6 0
3 years ago
Which best describes IMEI?
Delicious77 [7]

Answer:

A unique identifier for a mobile phone

Explanation:

There are different codes and tracking number assigned to different devices such as laptop, mobiles and other devices. The purpose of this task is to make sure the security of device in all aspects. The tracking number that is used to track mobile phone is named as IMEI that stands for International Mobile Equipment Identity.

IMEI is the the unique identity of mobile phone device that consists of 15 digits. It is the unique number that is assigned to phones.

8 0
2 years ago
Other questions:
  • What operating system was most commonly used by early personal computers? Apple Mac MS-DOS Windows
    6·2 answers
  • If you are driving at night, you should not use high-beam headlights within _________ of oncoming vehicles. Florida Road Rules 4
    9·2 answers
  • What is the leading use of computers
    15·2 answers
  • Why do most laptops have LCD rather than OLED displays, which are found on mobile devices?
    9·1 answer
  • Managing your calendar and emails can be easily accomplished through ___ software
    8·1 answer
  • Midday is a good time to take a portrait outside.<br> true or false?
    8·1 answer
  • How many clients has<br> Accenture engaged globally on blockchain?
    12·1 answer
  • B) The company's chief financial officer recognizes the need for an upgrade to the smart watches, but does not understand why th
    8·1 answer
  • Which is an example of machine-to-machine communication?
    7·1 answer
  • Which item is developed last in the cyclical design process
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!