1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margaret [11]
3 years ago
12

The function of the file server is to : 1. store data and software programs that can be used by client computers on the network.

2. manage all printing requests from clients on the network. 3. transfer e-mail messages to other servers on the network. 4. store HTML documents for an Internet or intranet web site. 5. coordinate the communication of client and servers on the network.
Computers and Technology
1 answer:
mylen [45]3 years ago
8 0

Answer:

1. store data and software programs that can be used by client computers on the network.

Explanation:

You might be interested in
____ is an example of a set of prewritten classes that allows you to access data stored in a database.
klemol [59]

Answer:

ADO.net

Explanation:

8 0
2 years ago
Which of the following is not an advantage of e-commerce for consumers?
matrenka [14]

Answer:  c. You have little risk of having your credit card number intercepted.

====================================

Explanation:

Choice A is false because it is an advantage to be able to choose goods from any vendor from anywhere in the world. The more competition, the better the outcome for the consumer.

Choice B can also be ruled out since that's also an advantage for the consumer. You don't have to worry about shop closure and that kind of time pressure is non-existent with online shops.

Choice D is also a non-answer because shopping online is faster than shopping in a brick-and-mortar store.

The only thing left is choice C. There is a risk a person's credit card could be intercepted or stolen. This usually would occur if the online shop isn't using a secure method of transmitting the credit card info, or their servers are insecure when they store the data. If strong encryption is applied, then this risk can be significantly reduced if not eliminated entirely.

3 0
2 years ago
Read 2 more answers
You can use tables for layout work. However, in XHTML, each form control should have its own ______ element
777dan777 [17]

Answer:

c. label

Explanation:

4 0
3 years ago
Create a text file named employee.dat containing the following data: b. Write a C++ program to read the employee.dat file create
Paul [167]

Answer:

1000 500 250 125 the output

Explanation:

write a program using integers userNum and x as input,  userNum divided by

x four times.  EX : If  the input is 2000 2 the output is 1000 500 250 125

8 0
3 years ago
The ____ algorithm was the first public key encryption algorithm developed (in 1977 and published for commercial use.
Whitepunk [10]
The RSA Algorithm was developed by and named after the initials of: Ron Rivist, Adi Shamir, and Leonard Adleman while they were working at MIT. It was developed in 1977 and published in 1978.  The algorithm uses the exponentiation modulo in encrypt and decrypt information. 
7 0
3 years ago
Other questions:
  • All of the following are qualities of an aprenticeship except
    12·1 answer
  • My computer have black spots and line
    7·2 answers
  • What is the purpose of the overload keyword in the ip nat inside source list 1 pool nat_pool overload command?
    8·1 answer
  • 12. When trying to identify the sorted column in a table, you would look for the column where A. an arrow is displayed in the fi
    10·2 answers
  • Show the stack with all activation record instances, including static and dynamic chains, when execution reaches position 1 in t
    6·1 answer
  • Why are application programs stored in main memory​
    11·1 answer
  • the tool that is used on the form to display text that the user cannot change is a. textbox b. label c. button​
    9·1 answer
  • Question 1 of 10
    15·1 answer
  • How many pages is 1500 words double spaced 12 font?.
    10·1 answer
  • In _________, the process requests permission to access and modify variables shared with others. a) entry section b) critical se
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!