1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga nikolaevna [1]
3 years ago
10

Which protocol is used by the client for microsoft networks and file and printer sharing for microsoft networks to communicate w

ith each other and share files?
Computers and Technology
1 answer:
Sidana [21]3 years ago
4 0
SMB is used <span>by the client for microsoft networks and file and printer sharing for microsoft networks to communicate with each other and share files.
Hope this helps!</span>
You might be interested in
Jump to Question: Fill in the blanks below: The flow of electricty is similar to the movement of water through a pipe. The movem
HACTEHA [7]

The answer is;

Current  

Voltage  

Power/Wattage  

Circuit

Water moving through pipes is like electricity flowing in a circuit. The flow of electricity is an actual flow of electrons. That movement of electrons is what is known as current. Think of current as the volume of water flowing through a water pipe. The electrons need some force or pressure to move, and so is water in a pipe. The voltage is that electromotive force; the pressure that pushes the electrons in a system. The power measured in Watts is the rate at which the energy is consumed. For the current to flow the circuit must be complete. Otherwise we cannot say that we have power if the circuit is not closed.

5 0
4 years ago
A company has two geographically separate locations that need to connect using a VPN. Which of the following devices must be spe
victus00 [196]

Answer:

The correct answer to the following question will be Option A (Firewall).

Explanation:

  • A network or information system of safety that relies on predetermined security rules that monitors and commands outbound traffic of network or it will be configured specifically to allow VPN to enter the network
  • This usually creates a firewall between a trustworthy internal network, such as the Internet, and the untrustworthy outside network.

The other solutions like B, C and D are not capable of allowing VPN to traffic to a network. Therefore, the correct answer is Option A.

3 0
3 years ago
What are some other features of sending attachments in Outlook 2016? Check all that apply.
Elis [28]

Answer:

the answer is a, b,d on edg.

Explanation:

8 0
3 years ago
Read 2 more answers
Which of the following is not one of the Fatal Four events that cause three out of five construction worker deaths? A. Caught in
k0ka [10]

The answer is D: Struck down.

Options A, B, and C are the most common types of fatal construction accidents in the United States. Falls, electrocutions, being struck by an object, and workers caught in or between things are responsible for over 64% of construction workers death. Among these four events, falls kill most construction workers followed by electrocutions, falling objects, and workers caught in or between things.


5 0
4 years ago
Read 2 more answers
What is the best approach to testing a website
Ronch [10]

A vital part of any website project is the quality assurance stage. Prior to launch, final QA testing ensures that your site is working according to your expectations and that your site users won’t be frustrated with any non-functioning pages.

7 0
3 years ago
Other questions:
  • How useful is the creation of folders for your computer
    9·1 answer
  • Which part of the cpu stores instructions for high speed access or processing
    14·1 answer
  • Two different names that refer to the same data item best defines:
    12·1 answer
  • Complete function PrintPopcornTime(), with int parameter bagOunces, and void return type. If bagOunces is less than 3, print "To
    9·1 answer
  • To what would you compare the transport layer?
    14·1 answer
  • Dit View
    5·2 answers
  • Which of the following is true regarding data analysis? a. Disciplines and professions do not provide guidance on data analysis.
    6·2 answers
  • PLS HEEELLLP ASAP, DONT JOKE
    9·2 answers
  • What is the difference between a surge and a spike?
    5·1 answer
  • What legal protection would cover a person invention?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!