1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grigory [225]
3 years ago
11

Someone hacked into an employees computer and erased all of their data. All data for the past three weeks was lost as that was w

hen the employee last performed a backup. Which type of network is the company more than likely using?
A. centralized

B. client server

C. GUI

D. peer to peer
Computers and Technology
2 answers:
ANEK [815]3 years ago
6 0

Answer:

B. client server

Explanation:

Someone hacked into an employees computer and erased all of their data. The employee had last performed a backup three weeks back. This means that there is a backup server in the company. In other words, the network architecture is of the form client-server where data from the employee computers is backed up to a centralized repository from where content could be restored. Hence option B represents the most likely choice.

vovangra [49]3 years ago
3 0

Answer:

The correct answer is letter "D": peer to peer.

Explanation:

Peer to Peer (P2P) networks are constituted by computers connected through the internet. Anybody with a computer internet access can connect to another computer within the same network and share files with no need for a central server granting access. The biggest disadvantage of this type of network is that as there is no central server, file sharing and back up are not controlled.

You might be interested in
If an M:N relationship is mandatory on both sides, and if both relations resulting from the entities involved in the relationshi
vivado [14]

Answer:

0

Explanation:

In the problem above, the relationship that exists between M and N is discovered to be on each side of the system. Furthermore, it was stated that the outcome of the relationship also has approximately 3 records. This shows that there is no record for the bridge that is formed as a result of the relationship.

4 0
3 years ago
Two independent customers are scheduled to arrive in the afternoon. Their arrival times are uniformly distributed between 2 pm a
seraphim [82]

Answer:

1/3

Explanation:

T₁ , T₂ , be the arrival times of two customers.

See expected time for the earliest and latest below.

The formulas used will guide you.

4 0
3 years ago
How many lines are on a standard sheet of typing paper?
kotegsom [21]
60 lines on the paper
3 0
3 years ago
Which of the following is not an interconnector?
igor_vitrenko [27]

The following is not an interconnector :

A wireless keyboard jack

Explanation:

  • An interconnector is a structure which enables energy to flow between networks.
  • An electrical or optical connection or cable that connects two separate devices.
  • Since a wireless device does not have a cable connecting the two, they are not an interconnector.
  • The cable that connects your monitor or hard drive to the computer system is called an interconnect.
  • Switches can be used to connect together a number of end-user devices such as workstations, or to interconnect multiple network segments.
  • A standard computer system will contain multiple interconnects.
3 0
3 years ago
INTRODUCTION TO JAVA​
amid [387]

Answer:

INTRODUCTION TO JAVA​

Explanation:

Java is one of the most popular programming languages out there. Released in 1995 and still widely used today, Java has many applications, including software development, mobile applications, and large systems development. Knowing Java opens a lot of possibilities for you as a developer.

5 0
3 years ago
Other questions:
  • Does anyone know this ? this website is scratch btw.
    10·1 answer
  • Which factor did not contribute to the increase of leisure travel in the early twentieth century in the United States?
    7·2 answers
  • 1. Consider a direct-mapped cache that can accommodate 8Mbytes from a main memory, that uses a 32-bit address and 32-byte blocks
    5·1 answer
  • I'm using assembly language. This is my assignment. I kinda confused about how to write code for this assignment. Can anyone exp
    11·1 answer
  • Write a program that reads a person's first and last names, separated by a space. Then the program outputs last name, comma, fir
    9·1 answer
  • Powerful IT security systems are needed to defend against what appears to be authorized access to a network or application. Sele
    6·1 answer
  • Translate We get up at 8 o'clock into Spanish in the box below:​
    9·1 answer
  • The Department Manager researches new data platforms for the company and requests a list of essential features. Which essential
    6·1 answer
  • 10.
    12·1 answer
  • What tool allows you to search external competitive intelligence research?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!