1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paha777 [63]
3 years ago
11

Identify and describe the four fundamental configurations that are the basis of most Windows printer deployments and describe ho

w these configurations add flexibility to windows printing.
Computers and Technology
1 answer:
pav-90 [236]3 years ago
5 0

Answer:

The four fundamental configurations include:

  1. Direct Printing
  2. Network Attached printing
  3. Locally Attached Printer Sharing
  4. Network Attached Printer Sharing

Explanation:

  • Direct Printing includes an independent device for printing and independent computer.
  • In Network Attached Printing clients use TCP to send their jobs to the printing devise while being in a network.
  • In Locally Attached Printer Sharing, the print device is shared among all the  clients in a network while the computer or device connected with printer acts as a server.
  • In Network Attached Printer Sharing the computer on the network acts as server while printer clients send the commands to printer server which are processed by print device after spooling.
<h2>Flexibility to windows:</h2>

Now these configuration add a lot of flexibility to windows printing by generating a server-client model, the printer can be shared among may of the clients as well as a single command can be run for a print among all the users or specific ones in a network. This can also benefit by less time consumption.

You might be interested in
_________________ component defines the correct granularity for access controls and oversees the relationships between identitie
Otrada [13]

Answer:

<u>Authorization</u> component defines the correct granularity for access controls and oversees the relationships between identities, access control rights, and IT resource availability.

Explanation:

Access control is a security technique that verifies the permission that a person or device has to enter an area and to what extent. This function is within the identity and access management of a company. Authorization is the definition of what a specific user can do within an application, that is, to what information and operations they have access, in other words, it refers to the management of access to protected resources and the process of determining whether a user is authorized to access a particular resource. Authorization and access control are ways of enforcing access policies. Authorized persons may access certain resources for their job functions and identify and audit the accesses made.

8 0
3 years ago
Loretta is shooting her product separately. She plans to integrate it into the main advertisement later on. What should Loretta
Vikki [24]

Answer:

A make the edges of the object, blurry to make the product look like it's part of the scene

Explanation:

It must be ensured that the object should fit into the scene. If this is not ensured, it is certainly going to look quite awkward in the main advertisement. The other options are not ensuring this requirement, which is what is required. Hence, the correct option is unanimously the option mentioned in the Answer section.

6 0
4 years ago
Microsoft Word Module 3 the answers for online class University MIS
Artist 52 [7]

Answer:

Nope

Explanation:

You can use open office for free

7 0
3 years ago
Fnaf ships anyone?<br><br> Idk I’m bored so please tell me I’m all ears ✨
zheka24 [161]
Foxy n mangle all the way.
4 0
3 years ago
Read 2 more answers
What is the result when you run the following program?
TiliK225 [7]

Answer:

C

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • The _____ icon looks like a clipboard with a page of paper attached. Cut Copy Paste Clipboard
    5·1 answer
  • Zenmap's topology tab displays a __________ that shows the relative size and connection type of all discovered ip hosts.
    10·1 answer
  • Studying MyMagic+ helps one understand the costs associated with information systems deployment at scale. According to your read
    12·1 answer
  • You can apply several different worksheet themes from which tab?
    10·2 answers
  • A large IPv4 datagram is fragmented into 4 fragments at router 1 to pass over a network with an MTU of 1500 bytes. Assume each f
    15·1 answer
  • What is the most common way for an attacker outside of the system to gain unauthorized access to the target system?
    15·1 answer
  • Which of the following languages does not provide built-in-pattern matching operations (the language, although, has pattern matc
    14·1 answer
  • Portable Document Format (PDF) is a file format that provides an electronic image of a document and can be viewed, printed, and
    12·2 answers
  • Mr. Simmons has assigned a research project. Every student in the class will create a single page report about the recycling hab
    15·1 answer
  • What command do we use to enter data from the keyboard?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!