Answer:
A peer-to-peer network is one in which two or more PCs share files and access to devices such as printers without requiring a separate server computer or server software. ... A P2P network can be an ad hoc connection—a couple of computers connected via a Universal Serial Bus to transfer files.
Answer: rootkit
Explanation:
Hi, A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.
A rootkit provides continued privileged access to a computer while hiding its presence. Because of this hiding characteristic it is very difficult to detect.
Once a rootkit has been installed, it allows someone to have total remote control of a computer and do things such as files executions and system changes.
Answer:
1. Through cooperation.
2. Understanding the market and the organization.
Explanation:
Information Technology can transform the way business processes in an organization only if there is cooperation in the company. The cooperation is that everyone is to agree on the change that it is going to cause.
An information Technologist can change the way business process if he or her understand the maker of the company and the company.
The major point is this:
1. The company must cooperate.
2. Everybody must accept change for it to grow higher.
3. Understand the market of the company and
4. understand the company and how they operate and then change and replace the parts that need replacement.
Answer:
Time taken to travel from one track to the next = 0.08ms
Initial track= 15 0
4 (15-4)*(0.08)= 0.88
40 (40-4)*(0.08)= 2.88
35 (40-35)*(0.08)= 0.4
11 (35-11)*(0.08)= 1.92
14 (14-11)*(0.08)= 0.24
7 (14-7)*(0.08)= 0.56
----------------------------------------------
Total seek time=0.88+2.88+0.4+1.92+0.24+0.56=6.88ms
Explanation:
We caculate the seek time for each request, and then add them together to find the total seek time. The final track number for the current request becomes the current track of next request, and this process is repeated till the last request is processed.
Answer:
False
Explanation:
Using subnet mask will be helpful, what the subnet mask does is moving the IP address boundary bettween the part that represents a network and the part that represents a host, thus, instructing the operating system which IP addresses are on the local subnet. Then the operating will communicate directly with the other host without using the router. Once this is achieved, memorizing the IP addresses is needless.