1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leokris [45]
3 years ago
9

You have a site (Site1) that has about 20 users. For the last few months, users at Site1 have been complaining about the perform

ance when accessing multiple files at the corporate office, particularly if the files are relatively large. They have no dedicated server to configure DFS replication. Therefore, what else can you do to improve performance when accessing these files?
Computers and Technology
1 answer:
SIZIF [17.4K]3 years ago
6 0
Upgrade Site1's (probably WAN) network connection.
You might be interested in
Please explain why an operating system makes a great attack target.​
BartSMP [9]
The operating system is the fundamental controller of all system resources
Operating system popularity is one major reason why hackers attack
Window is a big target because it powers the vast majority of the world’s desktop computers and laptops.
To steal personal and protected health information
To steal user credit card numbers and other financial data
To harm the system or disrupt business operations of any organization
To gain competitive edge over opponents
To spoil the reputation of an organization

If you want answer to question 19, put a Thanks and comment that you want answer to question 19
8 0
2 years ago
Do you watch markiplier?
ki77a [65]

Answer: Yes

Explanation: He is cool

5 0
3 years ago
Read 2 more answers
You and your friend who lives far away want to fairly and randomly select which of the two of you will travel to the other’s hom
Phantasy [73]

Answer:

c. your friend can hash all possible options and discover your secret.

Explanation:

SHA-256 is a set of hash functions that was designed by the NSA. SHA-2 is considered an upgrade on the set that was its predecessor, SHA-1. A hash is a mathematical function that condenses data in a process of one-way encryption. SHA-256 creates hash algoritms that are considered irreversible and unique. However, one of the properties of hashing algorithms is determinism, which means that any computer in the world would be able to compute a particular hash and get the same answer.

6 0
3 years ago
An excel file called “student_gpa” is opened. What does the funnel next to “GPA” indicate
Ivan

Answer is A. The data has been filtered

The funnel in Excel lets you know that there is a filter in place on the columns. It is a filter icon. By default, any filtered column in Excel gets a little funnel icon on the top row as shown in the image attached. Once this funnel symbols is clicked, it gives you options to filter using several criteria.

6 0
3 years ago
3.18: Pizza Pi Joe’s Pizza Palace needs a program to calculate the number of slices a pizza of any size can be divided into. The
alina1380 [7]

Answer:

#program in python.

#variables

slice_area=14.125

pi=3.14159

#read diameter

d=int(input("Enter diameter of pizza:"))

#area of pizza

area=pi*(d/2)*(d/2)

#number of slice

no_slice=int(area/slice_area)

#print slice

print("total silce are:",no_slice)

Explanation:

Declare and initialize a variable "slice_area" with 14.125 which is the area of a pizza slice.Initialize a variable "pi" with 3.14159.Then read the diameter of pizza.Find the area of pizza as "area=pi *d/2*d/2".Divide the total area with area of pizza slice.This will be the number of slice.

Output:

Enter diameter of pizza:20                                                                                                

total silce are: 22

6 0
3 years ago
Other questions:
  • Match the challenge with the term or process that offers a solution.
    6·1 answer
  • The smallest building block of a wireless lan is a ______.
    5·1 answer
  • What does the CPU do in a computer?
    7·2 answers
  • Options to open,save,and print a document are found on which of the following tabs? A.File B.Home C. Design D. Layout
    5·2 answers
  • While surfing online, Patricia checks her email and reads the latest messages. She then browsers a website and logs in a comment
    8·1 answer
  • 1. What does MS-DOS use for input?
    5·1 answer
  • Microsoft words spell checker
    9·1 answer
  • ---------------is a systematic review of a person’swork and achievements over a recent period, usually leading toplans for the f
    11·1 answer
  • A location in memory which stores a value, the value can change as the program is running is
    12·1 answer
  • Many ____ classes for certification are available on the Internet and by many companies that have set up intranets within their
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!