1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nookie1986 [14]
3 years ago
12

Wanda works for a large company. She and her team maintain a set of servers that support their office, and their office is conne

cted to other distant offices owned by the same company.
Which of the following is definitely true?

Wanda works inside a data center.
Wanda and her team run a WAN.
Wanda and her team run a P2P network.
Wanda and her team support a very secure network.
Computers and Technology
1 answer:
svlad2 [7]3 years ago
4 0

Answer:

Wanda works inside a data center.

Explanation:

A data center is a place where a company stores and manages its IT operations and devices. From this place the data is distributed.

A WAN is a network that works in a large area.

A P2P network refers to computers that are connected through the internet.

A secure network refers to any network that has security measures to avoid outside attacks.

According to the definitions and considering that the excerpt says that Wanda's team maintain a set of servers that support their office, and their office is connected to other distant offices, the answer is that Wanda works inside a data center.

You might be interested in
A security system uses sensors at every door and window which will set off an alarm if any one of them is opened. There is also
AnnyKZ [126]
You have a raspberry pi connected to all the sensors and a code running to  trigger if the sensors are triggered. Each sensor and keypad would run to a different input on the pi. They should al be able to be powered with a single cell lipo. Is that what you are asking?
5 0
3 years ago
This diagram shows a number of computing devices connected to the Internet with each line representing a direct connection.
Harman [31]

Answer: C

Explanation: Computing Device A is connected using 3 wires, which all lead to multiple different paths of wires. If you break all the wires off of A, it leaves it with no paths to use. However, if you do this with E, there is 4 differents paths connected to it. Since you need the MINIMUM, the answer would be C.

8 0
4 years ago
Use the YEARFRAC function to work out how many years difference is there between the date 1980-07-31 (31 July 1980) and 1998-05-
zhenek [66]

Answer: 17.7 Years

Explanation:

YEARFRAC is a function in Microsoft Excel that returns the year fraction representing the number of whole days between a particular start date and an end date.

A typical view of the function is:

=YEARFRAC(start_date, end_date, [basis])

All that needs to be done is

1. Type in the equal to sign(=) in the cell you want your answer,

2. Type in YEARFRAC and open your bracket,

3. Input your start date and end date, close your bracket and press enter.

6 0
3 years ago
What is the name for the warmth or coolness of white light?
Arturiano [62]

Answer:

white balance is the correct answer

4 0
3 years ago
Programmers should strive to _____. increase coupling increase cohesion both of the above neither a nor b
denpristay [2]
The answer is increase cohesion.  <span>Programmers should strive to increase cohesion.  C</span>ohesion<span> points to the </span><span>degree to which the elements inside a module belong together.  </span><span>In a highly </span>cohesive<span> system, code readability and reusability is </span>increased<span>, while complexity is kept manageable.</span>
7 0
3 years ago
Other questions:
  • Is a software program that allows users to access the world wide web
    10·1 answer
  • There are only three active stations in a slotted aloha network: a, b, andc. each station generates a frame in a time slot with
    15·1 answer
  • Mario wants to make his document more accessible to those who do not have access to a Word application. He
    9·2 answers
  • In both direct flooding attacks and _____ the use of spoofed source addresses results in response packets being scattered across
    9·1 answer
  • Which is a connectionless protocol in the transport layer? What are the small chunks of data called?
    12·2 answers
  • Hello, I am smart without showing off and I will help you with your homework and tell you the correct answers (◠ᴥ◕ʋ).​
    10·1 answer
  • Why is E in DELL tilted?​
    5·2 answers
  • How to tell if your cell phone is being tracked tapped or monitored by spy software?
    12·1 answer
  • What are three ways to protect yourself from identity theft when using your smartphone or computer?.
    15·1 answer
  • In a web application, the client uses a ___________ to interact with a web server.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!