1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ASHA 777 [7]
3 years ago
6

A network consists of 10 computers, all running windows 7 professional. one computer acts as a file server and serves up data to

other computers on the network. which networking model does the network use
Computers and Technology
1 answer:
DIA [1.3K]3 years ago
8 0
The networking model that they should use would be a peer-to-peer network model or P2P. It is a centralized network model wherein every network connected have the same administration rights. They share all resources without having a separate server.
You might be interested in
13. You're emailing your grandparents. Which of the following is the best example of digital etiquette?
lorasvet [3.4K]
D. spelling out words and avoiding slang
6 0
2 years ago
Read 2 more answers
A file with a .bat file extension is called a batch file. You can use a batch file to execute a group of commands, sometimes cal
Elan Coil [88]

Answer:

Create a text file. And add this code in it:

@echo off

You are welcome to the batch programming!

And now save it with .bat file type. Give it any name you want.

And to run the bat file, double click the bat file. It will be running.

You can run it from command prompt as well. Type as below:

C:\folder\batch_name.bat.

Now, we can add as many commands in the file as we want, and we can do the batch programming.

Explanation:

Please check the answer section.

8 0
3 years ago
What subsection of the Internet requires specialized browser to access and is frequently used by cyber criminals and underground
kotykmax [81]

Answer:

c. Dark Web                                                

Explanation:

Surface web is also called visible web is a part of world wide web that can be easily searchable using search engines as its contents are indexed by the search engines such as Google and its contents are accessible by public using standard web browsers. So a is not a suitable choice.

Deep Web is called invisible web as it is not accessible or searchable to standard search engines like Google. Search engines cannot index the contents of these sites. However such sites do not requires specialized browsers to access. So b is not a suitable choice.

Dark Web: It is a part of Deep Web sites but it requires specialized software and browsers to access. These sites cannot be indexed and cannot be searchable through standard search engines. This is also called dark side of the world wide web darker which is frequently used by criminals, hackers, black markets, hit-men. Illegal activities on a massive level is takes place in the dark web such as access to stolen sensitive information, malware, drug trade and terrorist operations. These sites are temporary and keep changing addresses to lessen the risk of getting caught by govt agencies or security officials. So c is the suitable choice.

Crypto-Net is a kind of neural network which works with encrypted data which can make a prediction based on the data without disclosing the data and prediction to the 3rd party. So d is not a suitable option.

6 0
3 years ago
Who wants to play nba 2k20 ps4
SOVA2 [1]

Answer:

Yo I’m down

Explanation:

6 0
3 years ago
Read 2 more answers
Intellectual property piracy has gotten a small boost from the increasing availability of counterfeit goods through Internet cha
Aliun [14]

Answer:

The answer is "Option B".

Explanation:

Intellectual property is protected by law in which property, copyright, and trademarks, are uses, that enable you to gain individuals' popularity or personally benefit according to what they create.

  • It is a program that helps to create an environment, in which imagination and technology are used.
  • It will change the growth by striking a balance between innovator rights and wider public interest.
3 0
3 years ago
Other questions:
  • Are there any tips or helpful advice for people who want to learn Photoshop?
    10·1 answer
  • Which dialog box in microsoft excel do you use to set the rotation of text in a cell to a specific degree?
    14·2 answers
  • CUANTO ES DOS MAS DOS POR FAVOR URGENTE :V
    10·2 answers
  • Of the three types of mutating malware, what type changes its internal code to one of a set number of predefined mutations whene
    9·1 answer
  • What is the tallest dam in the united states of america?
    14·2 answers
  • What is Mobile Edge Computing? Explain in tagalog.​
    5·2 answers
  • Nobody mind this plz
    14·1 answer
  • Httpsdiscord.ggBVNuFMgG link is here<br>come and join discord​
    13·1 answer
  • Explain with examples what is software​
    6·1 answer
  • Which of the following is NOT true about a USB stick?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!