1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Irina-Kira [14]
3 years ago
7

What are the differences, physically and logically, between the two printing configurations: Network-attached Printing and Netwo

rk-attached Printer Sharing?
Computers and Technology
1 answer:
evablogger [386]3 years ago
7 0

Answer:

They are essentially the same physically. Logically, the print jobs are handled differently.

Explanation:

You might be interested in
your manager asked you to set up a secure network connection at a remote site to move over some back ups. what protocol what do
Ivan

The protocol that should be used to establish a secure network connection for backups is SSH.

<h3>Secure Shell</h3>

SSH stands for <u>Secure Shell</u>. SSH is a <u>protocol that allows users to remotely control and modify servers</u>. SSH is commonly used by administrators to manage certain systems or applications remotely. So the admin can enter the computer via the network, then run various commands to modify or manage files from one computer to another.

SSH has several crucial functions for managing data transfer traffic. Specifically, the following are the functions and benefits of SSH:

  • Securing remote access to SSH-enabled systems or network devices for the user and processing them automatically.
  • SSH will automatically terminate the connection if there is suspicious activity on the connection used. So you can avoid various cyber threats such as IP and DNS spoofing, data manipulation, illegal tracking, and others.
  • Perform automatic and secure file transfers.
  • Launch commands securely on remote devices or systems.
  • Perform secure component management of network infrastructure.

Learn more about Secure network connection: brainly.com/question/28083478

#SPJ4

8 0
1 year ago
HELP PLZZ WILL MARK BRAINLIEST
adoni [48]

Answer:

if you could capture another image of this work bc I cant make out some words I can barley make out words

4 0
3 years ago
What is meant by byte in computer terminology​
dsp73

Answer:

Byte, the basic unit of information in computer storage and processing. A byte consists of 8 adjacent binary digits (bits), each of which consists of a 0 or 1. The string of bits making up a byte is processed as a unit by a computer; bytes are the smallest operable units of storage in computer technology.

Explanation:

Can I be brainliest? TYSMMMMMM      

7 0
3 years ago
Read 2 more answers
Rocks created from compaction and cementation of sediments are called:
Effectus [21]

Answer:

Sedimentary Rocks

Explanation:

Sedimentary rocks are essentially the Frankenstein monsters of the rock world. They're made up of pieces of igneous and metamorphic rocks, sand, clay, and other sedimentary rocks.

4 0
3 years ago
How does outlets generate electricity???
dimaraw [331]

Answer:

"a hole is connected to the wire that brings the electricity back to the breaker box. when you turn on a lamp, the hot part of the outlet allows electricity to flow" I got this info from Google.com

Explanation:

4 0
3 years ago
Other questions:
  • Which of the following statements best compares and contrasts the role of story writers and script writers
    12·1 answer
  • What is output when the CarTest application is run? Why?
    11·1 answer
  • A word object in an excel worksheet to activate the word features
    9·1 answer
  • Fact Pattern: A sales transaction record designed to contain the information presented below. Column Information 1-10 Customer a
    13·1 answer
  • Which guideline should you use when downloading software from the Internet?
    15·1 answer
  • When using a presentation software you can change the size of the text to...? Increase Font size, Decrease font size, increase t
    15·2 answers
  • Which of the following statements about the relationship between hardware and software is true? a) Hardware can be present in in
    9·1 answer
  • Why do attackers tend to target public or private Wi-fi networks?
    10·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    13·1 answer
  • Write a C# program named ProjectedRaises that includes a named constant representing next year’s anticipated 4 percent raise for
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!