1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grigory [225]
3 years ago
11

Someone hacked into an employees computer and erased all of their data. All data for the past three weeks was lost as that was w

hen the employee last performed a backup. Which type of network is the company more than likely using?
A. centralized

B. client server

C. GUI

D. peer to peer
Computers and Technology
2 answers:
ANEK [815]3 years ago
6 0

Answer:

B. client server

Explanation:

Someone hacked into an employees computer and erased all of their data. The employee had last performed a backup three weeks back. This means that there is a backup server in the company. In other words, the network architecture is of the form client-server where data from the employee computers is backed up to a centralized repository from where content could be restored. Hence option B represents the most likely choice.

vovangra [49]3 years ago
3 0

Answer:

The correct answer is letter "D": peer to peer.

Explanation:

Peer to Peer (P2P) networks are constituted by computers connected through the internet. Anybody with a computer internet access can connect to another computer within the same network and share files with no need for a central server granting access. The biggest disadvantage of this type of network is that as there is no central server, file sharing and back up are not controlled.

You might be interested in
Which one Bc I’m struggling
amid [387]
14 is c and 16 a btw do you go to connection academy
6 0
3 years ago
Read 2 more answers
Write a Java program that accepts an integer number from the user between 20 and 100. Next, divide the number by 12 and determin
Eddi Din [679]
Import java.util.Scanner;
class hola
{
public static void main(String[]args)
{
Scanner x=new Scanner(System.in);
int a=x.nextInt();
int b;
if(a>20&&a<100)
{
b=a%12;
if(b%2==0){
System.out.print("es par"+b);
}
else{
System.out.print("es impar"+b);
}
}
}

}
4 0
4 years ago
What is the purpose of installing updates on your computer?
Lostsunrise [7]

The purpose of adding updates to your computer are as follows:

  • Making sure your computer hardware can run the newest software programs
  • Ensuring the built-in virus protection software is up to date
  • Removing bugs and glitches from your operating system
  • Allowing your computer to run as fast as possible
4 0
2 years ago
How to send a message to another channel with an emoji slack
Advocard [28]

Answer: Tap and hold the message you'd like to share and select Share message. Tap the #channel name and choose where you'd like to share the message. Add an optional note, if you'd like. Tap the paper plane icon to share.

Explanation:

7 0
3 years ago
How do i block somebody on here, theyre making me have a panic attack. /srs
spin [16.1K]

Answer:

If someone is disturbing you a lo then you can report him/her.

  • Go to g-mail.
  • Type a message to US Support.
  • Add a screenshot of him/her whom you want to report.
  • Use polite words
  • At last, send it.

You will get soon response.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Type the correct answer in the box.
    7·1 answer
  • âwhen the footer is the last element in a page body, the _____ pseudo-element is used to add a placeholder element after the foo
    8·2 answers
  • Somebody who is good at this stuff, please halp meh ;-;
    6·1 answer
  • Firewall ____ indicate whether a large number of echo messages are being received.
    9·1 answer
  • Write a program that prompts the user for the name of two files each containing a single line that represents a decimal integerc
    11·1 answer
  • Write the definition of a public class Simple. The class has no constructors, methods or instance variables.
    6·2 answers
  • To uncompress the data back into its original binary state, you simply reverse the process. This technique is an example of what
    7·1 answer
  • Select the correct answer.
    15·1 answer
  • First Computers and Technology question in 4 years..
    11·1 answer
  • Element of python which is valid syntax patterns
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!