1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paha777 [63]
3 years ago
11

Identify and describe the four fundamental configurations that are the basis of most Windows printer deployments and describe ho

w these configurations add flexibility to windows printing.
Computers and Technology
1 answer:
pav-90 [236]3 years ago
5 0

Answer:

The four fundamental configurations include:

  1. Direct Printing
  2. Network Attached printing
  3. Locally Attached Printer Sharing
  4. Network Attached Printer Sharing

Explanation:

  • Direct Printing includes an independent device for printing and independent computer.
  • In Network Attached Printing clients use TCP to send their jobs to the printing devise while being in a network.
  • In Locally Attached Printer Sharing, the print device is shared among all the  clients in a network while the computer or device connected with printer acts as a server.
  • In Network Attached Printer Sharing the computer on the network acts as server while printer clients send the commands to printer server which are processed by print device after spooling.
<h2>Flexibility to windows:</h2>

Now these configuration add a lot of flexibility to windows printing by generating a server-client model, the printer can be shared among may of the clients as well as a single command can be run for a print among all the users or specific ones in a network. This can also benefit by less time consumption.

You might be interested in
How to find HCF and LCM of a number in Q Basic program?? ​
DerKrebs [107]
CLS
INPUT "Enter the first number"; a
INPUT "Enter the second number"; b
m = a
n = b
WHILE a <> 0
r = b MOD a
b = a
a = r
WEND
l = (m * n) / b
PRINT "HCF is "; b
PRINT "LCM is "; l
3 0
2 years ago
A DNS server on your client's network is receiving a large number of DNS queries from what appears to be a workstation on their
drek231 [11]

Answer:

The answer is reflective DNS attack

Explanation:

Reflective DNS Attack is used in many distributed DDoS attacks to knock down an internet pipe. The attack is divided in two stages: first  the attacker sends lots of requests to one  or more legitimate DNS servers  while using spoofed source IP of the target person, and then, in the second stage, the DNS server receiving the semi-legitimate requests replies to the spoofed IP, thereby unknowingly lauching an attack on the target computer with responses to requests never sent by the victim.

4 0
4 years ago
How do you change your password on this? This isn’t really a “Question” but....
MissTica
You go to edit profile and press the change password button.  click on profile pic
5 0
4 years ago
Read 2 more answers
What is the binary equivalent of the decimal number 138?
lubasha [3.4K]

Answer:

10001010

Explanation:

3 0
4 years ago
If a code word is defined to be a sequence of different letters chosen from the 10 letters A, B, C, D, E, F, G, H, I, and J, wha
netineya [11]

Answer:

The answer is 6:1 .

Explanation:

We don't need to have prior knowledge of combination or permutation.

Count the way to chose 4 letters.As given in the question chose sequence of different letters

For first place we have 10 letter

For second place we have 9 letter as one is already out

For 3 place we have 8 letter as two letter are already out

For 4 place we have 7 letter as three letter are already out

Total group of 4 letters = 10 * 9 *8*7

Similarly form group of 5 letters we have

Total group of 5 letters = 10 * 9* 8 * 7*6

then Calculating ratio between 4 and 5

We have,

Group 5 : Group 4 ::10 * 9* 8 * 7*6:10 * 9 *8*7

                              : : 30240 : 5040

divide by 5040 on both side we get

Group  5: Group 4 :: 6 : 1

5 0
3 years ago
Other questions:
  • Write a function listLengthOfAllWords which takes in an array of words (strings), and returns an array of numbers representing t
    14·1 answer
  • In addition to analyzing logic and program code, a project team usually holds a session with users, called a ____ walkthrough, t
    6·1 answer
  • Select the characteristics that describe the evolution of computers that predate the personal computer (select all correct answe
    12·1 answer
  • In what order does the Cascade look at factors to determine which CSS rule to follow?
    14·1 answer
  • Which of the following are used to classify plutons
    14·1 answer
  • Select the correct answer.
    6·1 answer
  • Who used the ICT in a report to UK government in 1997
    12·1 answer
  • after landing, you are tying down the aircraft when a person approaches and asks: "faa. are you the pilot of this aircraft?" wha
    11·1 answer
  • What is the earliest age you can collect social security.
    7·1 answer
  • The firewall protects a computer or network from network-based attacks along with _____________ of data packets traversing the n
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!