1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grigory [225]
3 years ago
11

Someone hacked into an employees computer and erased all of their data. All data for the past three weeks was lost as that was w

hen the employee last performed a backup. Which type of network is the company more than likely using?
A. centralized

B. client server

C. GUI

D. peer to peer
Computers and Technology
2 answers:
ANEK [815]3 years ago
6 0

Answer:

B. client server

Explanation:

Someone hacked into an employees computer and erased all of their data. The employee had last performed a backup three weeks back. This means that there is a backup server in the company. In other words, the network architecture is of the form client-server where data from the employee computers is backed up to a centralized repository from where content could be restored. Hence option B represents the most likely choice.

vovangra [49]3 years ago
3 0

Answer:

The correct answer is letter "D": peer to peer.

Explanation:

Peer to Peer (P2P) networks are constituted by computers connected through the internet. Anybody with a computer internet access can connect to another computer within the same network and share files with no need for a central server granting access. The biggest disadvantage of this type of network is that as there is no central server, file sharing and back up are not controlled.

You might be interested in
A programmer is writing a program that is intended to be able to process large amounts of data. Which of the following considera
Dmitry [639]

Answer:

B. How many programming statements the program contains

Explanation:

If a program is intended to be able to process large amounts of data, then the ability of the program to process larger data sets is heavily affected by

  • execution time
  • size of memory the program requires
  • storage space the program requires as it runs.

The length of the statements the program contains does not much affect program performance.

8 0
3 years ago
Hope has now created her sublist. 1. Oxygen a. Helps living things produce energy b. Helps protect living things from harmful ra
Alex_Xolod [135]

Answer: 1. put her insertion point at the end of item 2b. 2. press enter key

5 0
3 years ago
What is the use of an NDP?
Makovka662 [10]

Answer:

It defines five ICMPv6 packet types for router solicitation,router advertisement,neighbor solicitation,neighbor advertisement,and network redirects.

Explanation:

8 0
2 years ago
If the value of score1 is 350 and the value of score2 is 210, what will be the value of result after the code segment is execute
MAVERICK [17]

  The value of result of the  code segment is executed is known to be 4.

<h3>Why is the value of the code segment so?</h3>

  When the result of  is not  executed because the condition is said to be false and also when there is a false condition is, the else statement will be said to be true

  Therefore,   result = result + 2; -> result is brought up by 2 to bring about 4 and as such, the value of result of the  code segment is executed is known to be 4.

Learn more about scores from

brainly.com/question/19492935

#SJ1

4 0
2 years ago
you have a website that customers use to view product information and place orders. You would like to identify the maximum numbe
notka56 [123]

Answer:

a load tester.

Explanation:

Based on the information provided within the question it can be said that in this situation the tool that you should use is known as a load tester. This tool allows you to test your servers in order to see how it behaves under both normal conditions as well as the anticipated peak load conditions that it may be encountering in the near future. Which is exactly what you need for your website.

4 0
3 years ago
Other questions:
  • Programmers use _____ languages in the Rapid Application Development (RAD) methodology to facilitate code reuse?
    5·1 answer
  • 1 what elements of composition are under your control in photoshop
    13·1 answer
  • Blogs are typically written by large companies or organizations as a way to express formal, technical, or scholarly information
    5·2 answers
  • A technician is configuring a new SOHO multifunction wireless router at a customer’s location to provide network access to sever
    12·1 answer
  • <img src="https://tex.z-dn.net/?f=6.372%20%5Ctimes%2075%20find%20the%20product" id="TexFormula1" title="6.372 \times 75 find the
    6·1 answer
  • Students enrolled in a digital classroom participate in discussions and take field trips with classmates. watch instructional vi
    11·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    11·1 answer
  • Which are the top 10 Popular Cars and Video Games get max ammount of point that we can give​
    12·2 answers
  • What is being done to reduce the python population in florida?.
    5·1 answer
  • When copper wires are bundled together, they are susceptible to ____________, a form of interference where the signals leak out
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!