1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rzqust [24]
4 years ago
6

Brainstorming the pros and cons of upgrading versus replacing a set of ten desktop computers _________

Computers and Technology
1 answer:
fomenos4 years ago
6 0
Plan to purchase
Deploy
Support/ upgrade
Retire
Support/ upgrade
Deploy
You might be interested in
Which of the following is a difference between a centralized communication network and a decentralized communication network? a.
Crazy boy [7]

Option D is the answer.

Option A is rejected because in centralized communication notwork there is no free flow of communication in all directions ( all direction means between all the groups or layers of the network).

Option B is not the answer because centralized and decentralized networks has nothing to do with the size of organizations.

Option C is rejected because decision making process depends on the hard work and technical skills of groups of an organization about a field but not by the network discipline.

Option D is selected because in centralized network the information or decision making power is primarily limited to the upper level or higher members of organization and as mentioned decentralized decides on the basis of decision of all the groups or levels of the network.

5 0
3 years ago
Fair use laws allow you to use other people’s copyrighted information in which of the following purposes? A: For profit Purposes
andrew-mc [135]
Fair use laws allow you to use other peoples copyrighted info for educational purposes
3 0
4 years ago
Read 2 more answers
Wish I could give you a 1,000/5
emmainna [20.7K]

Is this a question or you mean you wish you could give people 1,000 points?

7 0
3 years ago
If an ips identifies an attack, it can ________.
Gennadij [26K]

Answer:

a. drop the attack packet(s)

Explanation:

An IPS not only detects and alerts system administrators but it also stops attacks. It is built to consistently monitor a network, report malicious incidents and take preventative actions. So, how does an IPS work exactly? An IPS does a deep packet inspection and either blocks the IP of whoever sent the malicious packet or removes the malicious packet's content and repackages its payloads. Thus, this means that the malicious packet is completely dropped by stripping off of its header information and any infected items in the packet.

5 0
3 years ago
Area of circle algorithm
den301095 [7]

Answer:

The correct answer is:

A = π r²

5 0
3 years ago
Other questions:
  • What is the legal right granted to all authors and artists that gives them sole ownership and use of their words, software, pict
    9·2 answers
  • Which is the correct process for selecting an entire row in a spreadsheet?
    15·2 answers
  • Describe the components of series-parallel circuit
    14·1 answer
  • Server farms such as Google and Yahoo! provide enough compute capacity for the highest request rate of the day. Imagine that mos
    12·1 answer
  • In programming, what is a string?
    8·2 answers
  • Radio waves pros and cons
    10·2 answers
  • Explain briefly why you cannot expect to find a previous version of every file with which you work.
    10·2 answers
  • Internet is an interconnected networks <br> o true <br> o false
    5·1 answer
  • How do you reset a g.mail password?
    12·2 answers
  • Write, compile, and test the MovieQuoteInfo class so that it displays your favorite movie quote, the movie it comes from, the ch
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!