Joining a workgroup requires setting up the PC with a workgroup name.
Answer:
Five provisions of cyber ethics are:
Your computer or system should not be used to harm others. Your cyber knowledge should not be used to steal other people's resources. One should not use or copy softwares for which you have not paid. ... Never use other people's resources without their consent.
Answer: keeps confidential documents secure,
displays a GUI, allocates the computer's resources, and retrieves files
Explanation:
The operating system can be defined as the software installed in the system that provides the information and services to the users by controlling the hardware, software resources, and regulates the computer programs. It runs the applications and programs in the system, displays the graphic user interface for the services, stores, manipulates, and retrieves files. It prevents the unauthorized access to the data and programs by using passwords thus provides the security to the system and documents.
Answer:
Transport layer
Explanation:
The transport layer is responsible for maintaining end to end communication between devices connected on a network.
The TCP/IP determines how data is exchanged between devices connected on a network by providing end to end communications that determines how it should be broken into packets.