1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Furkat [3]
3 years ago
14

An IT specialist is consulted about setting up a peer-to-peer network. What would the specialist say about security risk in this

type of network?
A. There are many separate points of access that pose a security risk.
B. The peer-to-peer network is the most secure network available.
C. Peer-to-peer networks use a central server to provide security measures.
D. Peer-to-peer networks limit outside network access, so there is no security risk.
Computers and Technology
2 answers:
Igoryamba3 years ago
7 0

Answer:

A

Explanation:

ohaa [14]3 years ago
6 0

I just did this, its A

You might be interested in
This term describes two or more arrays that hold related data, and the related elements in each array are accessed with a common
Nat2105 [25]

Answer:

Option (c)

Explanation:

Parallel arrays are those arrays which are used to store some records which needs more than one array to hold a entry but are interrelated and should be accessed by same index number. As they are of different data types so can't be stored as multi-dimensional array or matrix. Then parallel array comes to rescue. For example : Details of a student.

Name, age and ID of a student needs to be stored. So, three arrays can be made and each entry should be accessed by same index number.

7 0
3 years ago
Sometimes we write similar letters to different people. For example, you might write to your parents to tell them about your cla
OleMash [197]

?

?????????????????????

4 0
2 years ago
Is permanent software programmed into read-only memory.<br> Firmware<br> JavaScript<br> PHP<br> o
velikii [3]
Firmware is the software
5 0
2 years ago
कम्प्यूटर में एक समस्या को ठीक करने के लिए एक कार्यक्रम या कोनफीगरेशन परिवर्तन के बाद किए जाते हैं
VARVARA [1.3K]

restart.is done after the computer is passed through configuration

3 0
3 years ago
What is the correct sequence of the phases in the systems development life cycle?
HACTEHA [7]
1. Requirements gathering/analysis.
2. Design.
3. Development.
4. Testing.
5. Maintenance.
7 0
3 years ago
Other questions:
  • Describe the Say It, Cover It, Resay It method.
    14·2 answers
  • Assume you have just started a new job, have a car loan, and have a student loan. You have just received a cash gift of $1,000 f
    14·1 answer
  • Code the function (insertNth list N insValue) which constructs a new list by inserting the specified insValue into the list afte
    6·1 answer
  • Write a Temperature class that will hold a temperature in Fahrenheit, and will provide methods to get and display the temperatur
    5·1 answer
  • Assume that input file references a Scanner object that was used to open a file. Which of the following while loops shows the co
    6·1 answer
  • Which of the following countries have mixed-market economy
    5·1 answer
  • Which function calls would provide the most helpful test of this function? Remember: With tests, you are attempting to figure ou
    5·1 answer
  • Lee has changed the style of his table to make the header row stand out. Next, he wants to center the text in the header row and
    11·2 answers
  • dash is a set of communication standard using for transferring file information between computers in a network​
    5·1 answer
  • Patricia Works in a coffee shop and manages the inventory of items.for each item she needs to recover the quantity in stock and
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!