The workgroup as a type of windows network model allows all the participants to be represented equally on the network with no single computer having authority or control over another. The workgroup is peer-to-peer local area network.
Members of this network group can share files, printers, Internet connection.<span> and other local network resources.</span>
Answer:
In assembly language, two instructions control the use of the assembly language procedure.
CALL pushed the control to the return address onto the stack and transferred the control.
RET instruction returns the address that placed on the stack by a call instruction.
Explanation:
Action RET instruction
- The RET instruction pops the address and returns off the stack, which is pointed by the stack pointer.
- The stack is LIFO in memory at a particular location, and the pointer points offset from the stack location.
RET instruction does its job by consulting the register and memory state at the point when it is executed.
In RET instruction, only register and memory state is executed. Call instruction must save that address that figure out in a register and memory location.
Solution:
It is done by Operating system.
An Operating system is system software that manages computer hardware and software resources and provides common services for computer programs.
Time-sharing operating systems schedule tasks for efficient use of the system and may also include accounting software for cost allocation of processor time, mass storage, printing, and other resources.
For hardware functions such as input and output and memory allocation, the operating system acts as an intermediary between programs and the computer hardware, although the application code is usually executed directly by the hardware and frequently makes system calls to an OS function or is interrupted by it. Operating systems are found on many devices that contain a computer – from cellular phones and video game consoles to web servers and supercomputers.
The answer is smart card readers. Smart card readers can be implemented as part of an authentication system to verify the identification of employees.