1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mel-nik [20]
3 years ago
8

Edward has started up a new company with his friend, Matthew. Currently, he has only two people working with him. Which type of

network architecture do you think is appropriate for them at this point of time?
Computers and Technology
1 answer:
Kruka [31]3 years ago
6 0

A Peer-to-peer network architecture would work best for Edward and Matthew.

Although they have the option of creating a Client-Server type of network architecture, the number of people that they are currently working with would cost them a lot more than a peer-to-peer architecture.

One of the advantages of using a Peer-to-peer network architecture for a small network would be the access of files between all computers in the network. Even if one of the computers will fail, the other computers will still have access to the different files and information they will need to keep the company moving forward.

You might be interested in
Finding values in an array
hjlf

Answer:

The following code completes the program

for (i = 0; i < userValues.length; i++) {

     if(userValues[i] == matchValue){

         nuMatches++;

     }  }

 System.out.println(nuMatches);

Explanation:

<em>The question is poorly formatted. So, I correct the poorly formatted program segment and I complete the missing part of the program.</em>

<em>See attachment for complete program.</em>

The explanation is as follows:

This iterates through the array

for (i = 0; i < u s e r V a l u e s. length; i++) {

This checks if the current array element is the same as the match value

     if(userValues[i] == matchValue){

If yes, the number of matches is increased by 1

         nuMatches++;

     }  }

This prints the number of matches

 System.out.println(nuMatches);

Download txt
8 0
3 years ago
А.<br> is the highest education degree available at a community college.
s344n2d4d5 [400]

Answer:

The answer is "associate".

Explanation:

The two-year post-school degree is also known as the associate degree, in which the students pursuing any of this degree, which may take as little as 2 years to complete the course, although many prefer to do it at the same rate. Its first two years of a Bachelor (fresh and sophomore years) were covered by an Associate degree.

8 0
3 years ago
Write an algorithm (pseudo-code) that takes an unsorted list of n integers and outputs a sorted list of all duplicate integers.
nexus9112 [7]

Answer:

brainliest if it did help you

Explanation:

Given array : A[0...n-1]Now, create a count array Cnt[0...n-1]then, initialize Cnt to zero

for(i=0...n-1)

Cnt[i]=0 ---------O(n) time

Linearly traverse the list and increment the count of respected number in count array.

for(i=0...n-1)

Cnt[A[i]]++; ---------O(n) time

Check in the count array if duplicates exist.

for(i=0...n-1){

if(C[i]>1)

output (i); -----------O(n) time

}

analysis of the above algorithm:

Algorithm takes = O(1 + n + n + n)

                           = O(n)          

//java code

public class SortIntegers {

  public static void sort(int[] arr) {

    int min = arr[0];

    int max = arr[0];

    for (int i = 0; i < arr.length; ++i) {

      if (arr[i] > max) {

        max = arr[i];

      }

      if (arr[i] < min) {

        min = arr[i];

      }

    }

    int counts[] = new int[max - min + 1];

    for (int i = 0; i < arr.length; ++i) {

      counts[arr[i] - min]++;

    }

    for (int i = 0; i < counts.length; ++i) {

      if (counts[i] > 1) {

        System.out.print((i + min) + " ");

      }

    }

    

    System.out.println();

  }

  public static void main(String[] args) {

    sort(new int[] { 5, 4, 10, 2, 4, 10, 5, 3, 1 });

  }

}

7 0
3 years ago
______ is the primary and dominant cryptographic authentication and encryption framework for security development within the TCP
Kitty [74]

Answer:

"IP security" is the correct answer for the above question.

Explanation:

  • "IP security" is a set of rules or protocols which are used for the communication of the network.
  • It is a protocol that is used to encrypt the data which is needed to transfer on the network.
  • It provides security for the communication and it encrypts the data which is needs o transfer on the network.
  • The above question asked about the term which is used for encryption and security. So the answer is "IP security", which is defined above.
7 0
4 years ago
Read 2 more answers
Organizational behavioural aspects
zzz [600]

Answer:

Organizational behavior aspects are the points of view represented by external environments, including people and technology. We can make improvements to our physical aspects by using this particular aspect to understand how everyday elements interact with one another.

5 0
2 years ago
Other questions:
  • A cracked tone (reluctor) ring will often cause what type of problem
    13·1 answer
  • When working with a table, combining two or more cells into one is known as _____.
    12·1 answer
  • Which error produces incorrect results but does not prevent the program from running?
    7·1 answer
  • Maureen downloads three pictures of cabin sizes for her siblings to vote on. She inserts one picture per slide. The third pictur
    10·1 answer
  • this device can be used to type documents,send email,browse the internet,handle spreadsheets,do presentations,play games,and mor
    14·1 answer
  • Which item is most likely to be a standard part?
    14·1 answer
  • someone who wants the credentials of skilled training, but in less time that a four -year degree should consider
    8·1 answer
  • Which feature do we most likely use to quickly change the background, fonts, and layout?
    12·1 answer
  • Which will touch the ground first an elephant or a rock?
    9·2 answers
  • In the Business world people are often measured by their???
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!