1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mezya [45]
4 years ago
13

An ordinary office environment needs computers that have multiple user account settings where each user is allocated private dat

a storage. What type of workstations would you build for this environment? a. Build a thin client. b. Build a thick client. c. Build a virtualization workstation. d. Build a CAM workstation.
Computers and Technology
1 answer:
Liula [17]4 years ago
4 0

Answer:

B)  Build a thick client.

Explanation:

Option B is Correct: This is an ordinary "office" PC. It will be used to run locally installed desktop Applications. This can be configured with multiple user accounts with each having its own private data storage folders.

Option A is incorrect:  This is a PC or appliance designed to act as an interface to applications that run on a network server. User accounts are created on the server rather than directly on this

Option C is incorrect. This will run one or more operating system environments for testing not normally required in an ordinary office environment.

Option D is incorrect. These control machine tools found in manufacturing environments, not normal office environments.

You might be interested in
Which of the following is true? A)Checks and Debit Cards both withdraw money directly from a bank account. B)Checks are the most
trapecia [35]
I believe the answer is d
8 0
3 years ago
Read 2 more answers
What can help you best learn about appearance, habitats and behaviors of birds in your area
Korvikt [17]

c microbiology textbook

8 0
3 years ago
An attacker has hidden an NFC reader behind an NFC-based kiosk in an airport. The attacker uses the device to capture NFC data i
tatiyna

Answer:

Nfc relay attack

Explanation:

The NFC relay attack occurs when data is extracted by an attacker who puts himself in the middle of two parties having a communication with each other. As the message gets to a party, the attacker gets it and modifies it to their taste then passes it on.

This attacker in this question is extracting data by establishing communication between end user devices and reader in the kiosk

5 0
3 years ago
Which ribbon tab is not a default in Outlook 2016's main interface?
Verizon [17]

Answer:

review

Explanation:

4 0
3 years ago
Read 2 more answers
The LCD screens are found in​
Grace [21]
Projectors and portable consumer devices such as digital cameras, watches, digital clocks, calculators, and mobile telephones, including smartphones. LCD screens are also used on consumer electronics products such as DVD players, video game devices and clocks.
7 0
2 years ago
Other questions:
  • PYTHON CODE ONLY:
    7·1 answer
  • After brainstorming engineers may refine their ideas by making
    8·1 answer
  • You must obey any special signs or instructions as you pass a construction zone.
    14·2 answers
  • Which of the following is the most significant outcome of the formation of the SMPTE?
    6·2 answers
  • How do you think someone has programmed computer calculator?​
    13·1 answer
  • Your customer then asks you if it would be worth the investment for him to have Ethernet cabling installed to reach each of his
    7·2 answers
  • What are the economic, social, political and cultural effects of the West Indian Day Parade
    12·1 answer
  • What happens when an arithmetic operator is applied to non-arithmetic data types such as Boolean or character
    7·1 answer
  • Derek is creating an animation for his class project. What is the first step Derek should follow while creating the animation?
    11·2 answers
  • 8.10 Code Practice Question 1
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!