1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nuetrik [128]
3 years ago
13

A small workgroup inherits a second-hand printer without networking capabilities. Which of the following is the BEST method of s

haring this resource among the workgroup?A. Connect the printer to a Bluetooth adapter in order for the users to printB. Connect the printer by using the onboard Infrared portC. Connect the printer to a user’s workstation and share the deviceD. Connect the printer to a parallel switch box
Computers and Technology
1 answer:
butalik [34]3 years ago
5 0
Answer: c

Explanation: connect the printer to a users work station and share the device
You might be interested in
Consider an application that transmits data at a steady rate (for example, the sender generates an N-bit unit of data every k ti
grin007 [14]

Answer:

a; circuit-switched network.

b; No, it does not need congestion control.

Explanation:

For A;

A circuit-switched network is a better option for this application. This is because of the fact that the application is made up of long sessions with smooth data transfer capacity needs.

The transmission rate is known, and does not transmit in short intervals(short signals), every application session can have a bandwidth reserved without significant bandwidth wastage.

Also, the overhead expenses of setting up and tearing down connections are canceled out over the extensive period of running an application session.

For B;

If the packet-switched network is used, and traffic in the network comes from the said application. Even if every applications transmit one or more network connections. Still, we already know that every connection has enough transmission capacity to handle majority of the application data rates, no congestion(insignificant queuing) will happen.

This goes to say that no congestion control will be needed given such broad-based connection.

7 0
3 years ago
What is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messag
Burka [1]

Answer:

Teergrubing.

Explanation:

Teergrubing is an antis-pamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

It is a good antis-pamming approach because it slows response to the Simple Mail Transfer Protocol (SMTP) commands, thus tying up resources.

8 0
3 years ago
Read 2 more answers
Crashing almost always accelerates the schedule while increasing project risk, whereas fast tracking almost always accelerates t
Ivahew [28]

Answer: False

Explanation: Because fast-tracking doesn’t involve additional resources, it’s usually best to start with this technique while Crashing requires careful planning to prevent “panic mode” among the project crews and to avoid acceleration claims.

4 0
3 years ago
What enables image processing, speech recognition, and complex game play in artificial intelligence?
Paraphin [41]

Deep Learning enables image processing, speech recognition, and complex game play in artificial intelligence.

<h3>What is Deep learning?</h3>

This is known to be a part of machine learning, and it is seen as  neural network that is made up of three or more layers which tries to simulate the behavior of the human brain.

Note that Deep Learning enables image processing, speech recognition, and complex game play in artificial intelligence.

See options below

1)Expert Systems

2)Deep Learning

3)Natural Language Understanding (NLU)

4)Artificial General Intelligence (AGI)

Learn more about Deep Learning from

brainly.com/question/27844272

#SPJ1

5 0
2 years ago
What is network topology? PLZZZ HURRY
Mashcka [7]

Answer:

Network topology is the arrangement of the elements (links, nodes, etc.) of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial field busses and computer networks.

7 0
3 years ago
Other questions:
  • video-sharing sotes such as youtube and vimeo provide a place to post short videos called clips true or false?
    5·1 answer
  • Write a client program that writes a struct with a privateFIFO name (call it FIFO_XXXX, where XXXX is the pid that you got from
    11·1 answer
  • Does Windows 7 support secure boot in UEFI? Windows eight? Linux UBUNTU version 14?
    8·1 answer
  • A group of developers for a startup company store their source code and binary files on a shared open-source repository platform
    14·1 answer
  • 01110101<br> +00100100<br> 00010001
    8·1 answer
  • With which type of test question should you leave yourself extra time to answer?
    14·2 answers
  • What statement best describes entrepreneurship?
    7·2 answers
  • The __Option carries out the commands one at a time. O Step-by-Step Run Command Open Command​
    9·1 answer
  • WHATS YALL FAVORITE GAME WHOEVER GIVES THE BEST ANSWER WINS 200
    13·2 answers
  • For quantitative data (e.g. the number of milligrams of a drug) coding your data involves?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!