1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ilia_Sergeevich [38]
3 years ago
13

What type of windows network model allows all the participants to be represented equally on the network with no single computer

having authority or control over another?
Computers and Technology
1 answer:
noname [10]3 years ago
4 0
The workgroup as a type of windows network model allows all the participants to be represented equally on the network with no single computer having authority or control over another. The workgroup is peer-to-peer local area network. 
Members of this network group can share files, printers, Internet connection.<span> and other local network resources.</span>
You might be interested in
Rutherford concluded from his calculations that the volume of an atom is filled with protons, neutrons and electrons. is mostly
enyata [817]

Answer:

The answer is "is mostly empty space".

Explanation:

In the given question option numbers is defined, so the explanation to this question  as follows:

The volume of an element holds one mole at high temperatures. The nuclear mass is usually indicated by mole: cc/mol in the \ cm^3. It is also known as a quantity, in which the same molecule was the measured values based on atomic mass as well as the thickness of both, and certain alternatives were wrong which can be explained as follows:

  • atom doesn't fill the protons, neutrons, and electrons.
  • It can't revolve with outside atoms and electrons.

6 0
3 years ago
Mary is writing an article about the animal kingdom. She wants to place an image below the text. Which menu should Mary choose f
diamong [38]

Answer:

Idk

Explanation:

Idk

8 0
3 years ago
Individuals and businesses have concerns about data security while using Internet-based applications. Which security risk refers
Katen [24]

Answer:

Spam

Explanation:

If you receive in bulk the unsolicited messages, then that does mean that your inbox is being spammed. This will not harm you but you will lose the Gb that is allocated to your mailbox. And if you will not check then your mailbox will soon be full, and you might not receive some of the important messages that you should reply to immediately.

6 0
3 years ago
How do Hlookup and Vlookup differ?
german

HLOOKUP performs the same function as VLOOKUP, but looks up data that has been formatted by rows. HLOOKUP searches for a value in the top row of a table, and then returns a value in the same column from a row you specify in the table or array

6 0
3 years ago
Read 2 more answers
Sara is a college student studying accounting. She uses a laptop daily for personal and course work. What data might Sara have o
polet [3.4K]

Answer:

Sara: Personal data

Jorge : Personal data + official data.

Wanda: Personal data + students data

Carl: Personal data + official data

Explanation:

Personal data could contain pictures, social security numbers, banking transactions details, passwords, credit card information etc.

Jorge's official data could contain information about various sources that he gets his news from. It could contain password information about his official email. And he connects to the office network, he might pose a threat to the entire network if his PC is infected.

Wanda could leak the student's information. She could also leak her social security numbers, bank details, organization's details etc.

Carl could leak company's information. He can avoid it by staying away from public networks. Installing anti-virus. He should also take great care while accessing various sites and never download harmful files over the internet.

8 0
3 years ago
Other questions:
  • You have been instructed to connect a computer to a group of hosts that have been segmented from the regular network. What kind
    7·1 answer
  • What does xhtml stand for?
    5·2 answers
  • How many megabytes of data can a factory made audio cd hold?
    13·1 answer
  • 6 The part of the computer that contains the brain or central processing unit is also known as the ?
    11·1 answer
  • The OSI model is currently the most widely implemented network model used to develop and build networks of any size, including t
    8·1 answer
  • A(n) ____ investigation tracks all elements of an attack, including how the attack began, what intermediate devices were used du
    5·1 answer
  • 17. Ano ang tawag sa pahina ng Excel?
    12·1 answer
  • Write down the stages in the information prcessing cycle in correct order​
    5·1 answer
  • Jasmine wants electrical current to be able to pass through a certain switch on a circuit board that she is designing. What stat
    5·1 answer
  • 20 POINTS! Which music making software is better? Ableton Live or Logic Pro? Name the advantages and disadvantages of each one!
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!