1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sophie [7]
3 years ago
10

Peer-to-peer systems typically depend on untrusted and volatile computer systems for most of their resources. Trust is a social

phenomenon with technical consequences. Volatility (i.e. unpredictable availability) also is often due to human actions. Elaborate your answers to Question 1 by discussing the possible ways in which each of them is likely to differ according to the following attributes of the computers used
: (a) ownership

(b) geographic location

(c) network connectivity

(d) country or legal jurisdiction
Computers and Technology
1 answer:
TEA [102]3 years ago
7 0
C network connectivity
You might be interested in
What benefit does internet have​
Licemer1 [7]
Information can be transferred and passed way easier.
5 0
3 years ago
After stating your thesis, follow up by demonstrating the importance of the topic, and explain why the audience or future audien
bearhunter [10]

Answer: audience relevance

Explanation:

Most importantly when stating a thesis we should show and present how the work in the thesis is relevant to the audience. In this way we would be able to connect our research work more to the people and the audience. We should be able to state how our work is going to benefit them, what the people should do in this regard and all the dos and don't must be mentioned clearly while stating our thesis.

4 0
4 years ago
What are some random fun facts about Technology?
Lana71 [14]

Answer:

i do not know

Explanation:

but it helps to communication

5 0
3 years ago
Create a Card class that represents a playing card. It should have an int instance variable named rank and a char variable named
Helen [10]

Answer:

Explanation:

The following code is written in Java. It creates the Card class and then uses it to create a full house and print out the rank and suit of every card in that hand.

class Card {

   int rank;

   char suit;

   public Card(int rank, char suit) {

       this.rank = rank;

       this.suit = suit;

   }

   public int getRank() {

       return rank;

   }

   public char getSuit() {

       return suit;

   }

}

class CardTester {

   public static void main(String[] args) {

       Card card1 = new Card(3, '♥');

       Card card2 = new Card(3, '♠');

       Card card3 = new Card(3, '♦');

       Card card4 = new Card(2, '♦');

       Card card5 = new Card(2, '♣');

       System.out.println("Card 1: " + card1.getRank() + " of " + card1.getSuit());

       System.out.println("Card 2: " + card2.getRank() + " of " + card2.getSuit());

       System.out.println("Card 3: " + card3.getRank() + " of " + card3.getSuit());

       System.out.println("Card 4: " + card4.getRank() + " of " + card4.getSuit());

       System.out.println("Card 5: " + card5.getRank() + " of " + card5.getSuit());

   }

}

3 0
3 years ago
Which 3 file formats can be used for importing lists directly into quickbooks online?.
Natali5045456 [20]

Answer:

Explanation:

QBO

IIF

QBJ

8 0
2 years ago
Other questions:
  • If a cache access requires one clock cycle and dealing with cache misses requires an additional five clock cycles, which of the
    9·1 answer
  • Many malware attacks are ____ attacks, which involve more than one type of malware and/or more than one type of transmission met
    6·1 answer
  • Define the missing function. licenseNum is created as: (100000 * customID) + licenseYear. Sample output:
    10·2 answers
  • Of which of the following devices are point, drag, and click actions?
    15·1 answer
  • Why are advanced features helpful when businesses use spreadsheets
    5·1 answer
  • When public relations professionals make provocative statements in newsgroups to get people to visit an organization's website o
    10·1 answer
  • When it comes to the best possible security for your wireless router, be sure to use WEP encryption to ensure that your transmis
    14·1 answer
  • How do you determine which type of operating system that best supports your computer or mobile device?
    5·1 answer
  • Qr code is more developed than barcode​
    11·1 answer
  • Amber, a network administrator, is conducting VoIP training for other IT team members. Melanie, a new team member, is confused a
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!