1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guapka [62]
2 years ago
13

Read each statement below. If the statement describes a peer-to-peer network, put a P next to it. If the statement describes a s

erver-based network, put an S next to it.
P - Peer-to-peer
S - Server-based
1. passwords are required to log in to the network
2. provides centralized network security
3. relatively low cost
4. scalable
5. used in organizations with lots of employees
Computers and Technology
2 answers:
Komok [63]2 years ago
8 0
1. S
2. S
3. P
4. ??
5. S

tia_tia [17]2 years ago
7 0
The answers would be:
1.s
2.s
3.p
4.s
5.p
You might be interested in
Write algorithm to find (a+b)^2=(a+b)*(a+b)​
Masja [62]

Answer:

Basically

(a+b)^2 = a^2 + b^2 + 2ab

Explanation:

steps

       1: start

       2: read a value

        3: read b value

        4: c=(a+b)*(a+b);

        5: print  c value

         6:end

3 0
2 years ago
What is the interface in Java programming Language? Why do we need to use it?
Alenkasestr [34]

To accustom to several different language-speaking countries. One program is often used internationally so having a language setup is very important.

6 0
3 years ago
Which is used to identify the network portion and the host portion of an ip address?
qwelly [4]
<span>subnet mask is used to identify the network portion and the host portion of an ip address.</span>
3 0
3 years ago
An effective team would never have ______.
inysia [295]
An ineffective leader
3 0
2 years ago
Which of the following types of software applications would open a file
Mumz [18]
It’s C. An MP3 file is an audio/video file, so only a media player would be able to play this
8 0
3 years ago
Other questions:
  • SELECT vendor_name, COUNT(*) AS number_of_invoices, MAX(invoice_total - payment_total - credit_total) AS balance_due FROM vendor
    15·1 answer
  • Which statement best represents the denotation for the word “woman”? A woman is an adult human female. Both man and woman are re
    11·2 answers
  • Write a program that reads numbers from a file (or allow user to input data) and creates an ordered binary tree. The program sho
    8·1 answer
  • Phishing is a broad term that describes any program that is designed to cause harm or transmit information to others without the
    8·1 answer
  • Describe the best way to deal with a difficult co-worker?
    13·2 answers
  • Networking and telecommunications technologies, along with computer hardware, software, datamanagement technology, and the peopl
    11·1 answer
  • The design of a blog refers to:
    8·1 answer
  • Please tell fast plzzzzzzzz​
    11·2 answers
  • An important goal of biosecurity training is to: Prevent laboratory accidents that could expose personnel to hazardous agents. P
    13·1 answer
  • What is a word processing program? Give examples of word processing programs.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!