1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artyom0805 [142]
4 years ago
12

A small but growing advertising business hires a new secretary. Until now, the computers have been directly connected, and all t

he employees
have shared a printer. While top management hopes their secretary is trustworthy, they do not want their secretary's computer fully connected to
all the other computers just yet. What do they need to do?
Change their LAN into a WAN.
O Change their P2P network into a client-server network
O There is no network-based solution for this problem.
Change their WAN into a LAN.
Computers and Technology
1 answer:
Lubov Fominskaja [6]4 years ago
8 0

Answer:

sorry I can't, pliz u search in google so that u can understand well from that

You might be interested in
Should a social network own our social data? Is it an invasion of privacy for social networks to collect and use the information
Svetradugi [14.3K]

Answer:

The description for the given question is described in the explanation section below.

Explanation:

No, we don't even own our identity data on social networking sites. It may be said as permission is needed as an factor for recognizing an acceptable interpretation and solution to a circumstance as well as a method to be followed.

  • They would conclude that, in contemplating the data generated from social networking, this could be recognized that although the data that they left as our electronic fingerprints must be used with applications that can provide the businesses with the appropriate strategy to best reach the consumer.
  • With all this into consideration, the method of information gathering does not include personal identifying information, and also the reality that we must be made mindful of what details has been accessed as well as the right to get out of obtaining such details from the social platform.
3 0
3 years ago
What precautions should be taken to make a computer more secure ​
Sergeeva-Olga [200]

Answer:

To make a computer more secure

Explanation:

we have following ways :

1)we should have anti virus to protect our computer.

2)we should not play or look computer for a long time because it destroy our files

4 0
3 years ago
What is the area on a machine where work is actually being performed and
zhenek [66]

Answer:

Point of operation guarding

Explanation:

Point of operation guarding. Point of operation is the area on a machine where work is actually performed upon the material being processed. The point of operation of machines whose operation exposes an employee to injury, shall be guarded.

5 0
3 years ago
Which of these is not a sub-claim "Our Clean Power Plan" uses to support its main claim? The CPP protects public health. The CPP
Leno4ka [110]
The CPP cleans the air statement is not a sub-claim of Our Clean Power Plan.

It is the efforts of President Barrack Obama and the U.S. Environmental Protection Agency that has the main goal of lessening to cutting carbon pollution from the present power plants
4 0
3 years ago
Read 2 more answers
Although the chi-square distribution is continuous, it is used to analyze discrete (counts) data
Roman55 [17]
This is true! The chi-square distribution is continuous and it is used to analyze discrete (counts) data.
4 0
4 years ago
Other questions:
  • According to the text, what have humans used throughout history to overcome physical limits?
    12·1 answer
  • Briefly explain what is net neutrality and why is it important today
    15·1 answer
  • True or False
    13·1 answer
  • On the Cities worksheet, click cell H13 and enter the function that calculates the total costs for the first city. Copy the func
    14·1 answer
  • What is the correct html element for playing audio files?
    11·1 answer
  • How do computers benefit individuals' health care?
    10·1 answer
  • I'd: 9872093250, password: qqqqq, join the meeting​
    11·1 answer
  • Which type(s) of license(s) allow the underlying software code to be viewed?
    15·1 answer
  • Which types of online reading tools are available within the CloseReader? Check all that apply.
    11·1 answer
  • If String str = "Computer Science";, then what is the value of str.substring(10);? ​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!