1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Furkat [3]
3 years ago
14

An IT specialist is consulted about setting up a peer-to-peer network. What would the specialist say about security risk in this

type of network?
A. There are many separate points of access that pose a security risk.
B. The peer-to-peer network is the most secure network available.
C. Peer-to-peer networks use a central server to provide security measures.
D. Peer-to-peer networks limit outside network access, so there is no security risk.
Computers and Technology
2 answers:
Igoryamba3 years ago
7 0

Answer:

A

Explanation:

ohaa [14]3 years ago
6 0

I just did this, its A

You might be interested in
As we move up a energy pyrimad the amount of a energy avaliable to each level of consumers
AleksandrR [38]

Explanation:

As it progresses high around an atmosphere, the amount of power through each tropic stage reduces. Little enough as 10% including its power is passed towards the next layer at every primary producers; the remainder is essentially wasted as heat by physiological activities.

8 0
3 years ago
Can you help me solve this challenging activity?
diamong [38]

Answer:

user_age = int(input())

if user_age > 17 and user_age != 25:

   print("Eligible")

else:

   print("Not eligible")

Explanation:

3 0
2 years ago
What is the recommended size for bulleted text? 12–22 24–40 44–66 54–80
algol [13]
44–66

According to sources, the most probable answer to this query is 44–66 point size.
This is because the eyes and the illustration should match the proportion of distance and height factors.
Thank you for your question. Please don't hesitate to ask in Brainly your queries. 
5 0
4 years ago
When would you use a composite primary key? Group of answer choices
vichka [17]

Answer:

A. Multi-field attributes

B. A ternary relationship

C. A unary relationship

6 0
3 years ago
Read 2 more answers
What is the definition of overflow in binary?
asambeis [7]
Overflow occurs when the magnitude of a number exceeds the range allowed by the size of the bit field. The sum of two identically-signed numbers may very well exceed the range of the bit field of those two numbers, and so in this case overflow is a possibility.
4 0
3 years ago
Other questions:
  • Wendy is an attacker who recently gained access to a vulnerable web server running Microsoft Windows. What command can she use t
    9·1 answer
  • What type of firestopping technology expands as much as 25 times in volume?
    6·1 answer
  • List 7 internal components in a computer system
    8·2 answers
  • An OR function nested in an IF function results in
    11·1 answer
  • What would you use to compare two date ranges in a report?
    9·1 answer
  • Why do some people think the global<br> economy is good for the United States?
    10·1 answer
  • Write a short program using Python that will:
    10·1 answer
  • What is a common use for append queries?
    14·2 answers
  • Explain drawing and painting package.​
    12·1 answer
  • Tại sao xe chỉ sản xuất ra 1996cc mà không phải là 2000cc?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!