1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ikadub [295]
3 years ago
7

You have a large company, and it is important to your business that your employees' work is backed up regularly. Which network w

ould provide you with the most security?
A. Centralized
B. Client Server
C. GUI
D. Peer-to-Peer
Computers and Technology
2 answers:
Artyom0805 [142]3 years ago
6 0
It really depends on what you doing GUI is best for high graphics output
DedPeter [7]3 years ago
5 0
Think it'sssssaa bbbbbbbb
You might be interested in
Why is linux referred to as open source software?
ss7ja [257]
<span> </span>Linux<span> is a computer operating system, like Microsoft Windows or Apple Mac OS they call it Free </span>Software/Open Source<span>, or Socially Responsible </span>Software<span>. Closely related is the concept of </span>Open Source Software<span>.</span>
7 0
3 years ago
What type of device is characteristic of an enterprise environment? Question 14 options: a) A workstation used by a retired pers
sertanlavr [38]

Answer:

A workstation used at an engineering firm is characteristic of an enterprise environment.

4 0
4 years ago
The collection of computer instructions and other files that constitute a piece of software is
lutik1710 [3]
The answer would be
A. Codebase

8 0
3 years ago
Read 2 more answers
True or false mobile devices need to work within limited screen space
eduard
A phone may have a 4 inch screen and so it cant just extend to 5 inches. So it would he true
3 0
3 years ago
Read 2 more answers
Which behaviors demonstrate good netiquette? Check all that apply.
Andru [333]

Answer:

identifying yourself in a post or e-mail

writing short

respecting others privacy

Explanation:

3 0
3 years ago
Other questions:
  • Explain the concept of risk management, including risk identification, assessment, and control.
    5·1 answer
  • Digital certificates can be used for each of these EXCEPT _____. A. to encrypt channels to provide secure communication between
    13·1 answer
  • What are frames in anamation
    11·2 answers
  • WILL GIVE BRAINLIEST
    15·1 answer
  • ¿porque y como surge la informatica y las computadoras
    13·1 answer
  • The program DebugTwo2.cs has syntax and/or logical errors. Determine the problem(s) and fix the program.// This program greets t
    5·1 answer
  • Which of the following describes the purpose of project management? planning and organizing resources to meet a goal arranging t
    15·1 answer
  • Write a program that defines an array of integers and a pointer to an integer. Make the pointer point to the beginning of the ar
    12·1 answer
  • Write any one method to delete a table in writer​
    11·1 answer
  • What is a method that deletes an item from a list using the item’s value?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!