1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergey [27]
3 years ago
7

What is the disadvantage of server based network?

Computers and Technology
2 answers:
lukranit [14]3 years ago
5 0

Answer:

do u have different networks too?

Solnce55 [7]3 years ago
4 0

Answer:

The disadvantage of server based network are:

  • If one of the servers go down all the users are affected and it may bring the whole network down.
  • More expensive to set up and maintain.
  • Expensive
  • Administrating
  • specialist staff such as a network manager is needed.
You might be interested in
Which is a good way to improve your credit score
labwork [276]
Pay your bills and don't be late
8 0
3 years ago
If you have machines doing jobs, fewer staff are needed, therefore costs are
elena55 [62]
If you have machines doing jobs, fewer staff is needed, therefore the costs are LESS.

Hope I helped!
4 0
3 years ago
Read 2 more answers
PLEASE HELP!
lawyer [7]

To block link that keeps popping up everywhere, one can:

  • Use your browser and click on block Pop-ups  in settings
  • Install an antivirus.

<h3>How do I stop pop-up links?</h3>

One can do so if they Manage the pop-up by blocking it in the Chrome browser where they:

  • Click on Settings from the Chrome menu.
  • input 'pop' in the search bar.
  • Select Site Settings  and then select Pop-ups and redirects.
  • Here one can toggle the Pop-ups and redirections option to Blocked them.

Therefore, To block link that keeps popping up everywhere, one can:

  • Use your browser and click on block Pop-ups  in settings
  • Install an antivirus.

Learn more about pop up link from

brainly.com/question/13666301

#SPJ1

4 0
2 years ago
Imagine you have borrowed your friend's computer to work on a class project. Checking
castortr0y [4]

Answer:

Yes.It would be considered as a computer Crime.

Explanation:

This is because you are an unauthorised user

6 0
3 years ago
An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The at
Anni [7]

"A Buffer overflow" vulnerability exploit resulted from the attacker's actions.

Whenever a software or an application writes too much data into a buffer, causing neighboring storage regions to have been corrupted as a consequence, this could be determined as Buffer overflow.

⇒ There are two kinds of Buffer overflow attacks such as:

  • <u>Stack-based</u> - It will become more popular to use such memory, as well as that's only available during implementation of any code.
  • <u>Heap-based</u> - Those attacks seem to be more difficult to execute because they entail overflowing overall storage capacity allotted for a program further than the space needed for something like the program's present activities.

Thus we can say that the correct answer is a Buffer overflow.

Learn more about Buffer overflow here:

brainly.com/question/4952591

6 0
2 years ago
Other questions:
  • A communications system connecting two or more computers is called a(n) ________.
    7·1 answer
  • When a server crashes and goes offline on a network, which of the following helps to determine that the server is unavailable?
    9·1 answer
  • "where is a cookie that is created during a web site visit​ stored?"
    9·1 answer
  • After you set a pin for a domain account on your laptop, that pin can be used only on your laptop. question 17 options:
    7·1 answer
  • Communications technology and the Internet can be used to reduce the time and costs involved in disseminating financial statemen
    14·1 answer
  • Ricardo twists his ankle at work but does not immediately realize that he is injured because his ankle is not sore or swollen, a
    5·1 answer
  • Assume that an array named salarySteps whose elements are of type int and that has exactly five elements has already been declar
    12·1 answer
  • Ok.,so i have a sopitify account and by accident i pressed the downlaod on button and it says start you free trial i pressed tha
    11·2 answers
  • In a dark place you have only a match , a twig , campfire logs , and oil lamp and a candle which do you literally first /
    15·1 answer
  • One way to use contiguous allocation of the disk and not suffer from holes is to compact the disk every time a file is removed.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!