1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grigory [225]
3 years ago
11

Someone hacked into an employees computer and erased all of their data. All data for the past three weeks was lost as that was w

hen the employee last performed a backup. Which type of network is the company more than likely using?
A. centralized

B. client server

C. GUI

D. peer to peer
Computers and Technology
2 answers:
ANEK [815]3 years ago
6 0

Answer:

B. client server

Explanation:

Someone hacked into an employees computer and erased all of their data. The employee had last performed a backup three weeks back. This means that there is a backup server in the company. In other words, the network architecture is of the form client-server where data from the employee computers is backed up to a centralized repository from where content could be restored. Hence option B represents the most likely choice.

vovangra [49]3 years ago
3 0

Answer:

The correct answer is letter "D": peer to peer.

Explanation:

Peer to Peer (P2P) networks are constituted by computers connected through the internet. Anybody with a computer internet access can connect to another computer within the same network and share files with no need for a central server granting access. The biggest disadvantage of this type of network is that as there is no central server, file sharing and back up are not controlled.

You might be interested in
Aapke question about computer keyboard​
Lapatulllka [165]

Explanation:

A computer keyboard is an input device that allows a person to enter letters, numbers, and other symbols (these are called characters in a keyboard) into a computer. It is one of the most used input devices for computers. Using a keyboard to enter lots of data is called typing

8 0
3 years ago
Need the answer ASAP plz !!!!!
Evgesh-ka [11]
Performance would be the answer
3 0
3 years ago
What is a set of javascript statements that result in an action?
AlexFokin [52]

function is the right answer because function is a block of code designed to perform a particular task

4 0
4 years ago
Can both mediated interpersonal communication and mass communication has an ability to reach huge number of recipients or audien
mars1129 [50]

Answer:

Explanation:

Somewhat

7 0
3 years ago
Which course must first-time drivers in Florida take to be eligible for their Learner License?
Travka [436]
The Traffic Law and Substance Abuse Course (TLSAE), which is also known as the drug and alcohol course.
7 0
3 years ago
Other questions:
  • What are the 4-bit patterns used to represent each of the characters in the string "1301"? Only represent the characters between
    14·1 answer
  • What is the purpose of the BBC option in a email?
    7·1 answer
  • Which of the following are types of home internet service? Check all that apply
    7·1 answer
  • Suppose that you want to write a program that inputs customer data and displays a summary of the number of customers who owe mor
    14·1 answer
  • Why is it important to evaluate the website on which you plan to shop?
    7·2 answers
  • The first step to accurate coding is to identify the ___________ in the diagnostic statement.
    7·1 answer
  • The first page of a website is what?​
    5·2 answers
  • Calculate the time complexity for the following function in terms of Big O notation. Explain your answer.
    13·1 answer
  • Trent is researching what it would take to become a pharmaceutical scientist. What academic requirements should he complete?
    12·1 answer
  • Please solve this in JAVA<br><br> Please see the attachment
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!