1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Allushta [10]
3 years ago
9

A small company with 100 computers has hired you to install a local area network. All of the users perform functions like email,

browsing and Office software. In addition, 25 of them also do a large number of client/server requests into a database system. Which local area network operating system would you recommend?
Computers and Technology
1 answer:
charle [14.2K]3 years ago
8 0

Answer:

Answer to the following question is as follows;

Explanation:

Windows 7 for 100 users and Windows 8.1 for 25 users are the best options since they both enable networking and active directory, and Windows 8.1 also offers Windows server capabilities.

Winxp would therefore work for $100, but it is unsupported and has no updates.

If you wish to go with open source, you can choose Ubuntu 16 or 18 or Linux.

You might be interested in
What method of malware infection installs malware through use of a separate browser window that opens uninvited from a Web page?
IgorC [24]

Answer:

Pop-up download

Explanation:

A pop-up download occurs when a user is on a web page and a pop-up window shows that asks the user to download a program to their computer, It is mostly used to install malware that monitors the user online behavior and reports back to the spyware company.

7 0
3 years ago
Read 2 more answers
Which of these statements about the truck driving occupation in the U.S. are accurate?
Airida [17]

Answer:

I'm unsure 38373672823

8 0
2 years ago
Read 2 more answers
You have two microservices that need to communicate with each other without holding up a thread on either end. One service will
Yakvenalex [24]

Answer: E. Use a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available.

Explanation:

Since there are two microservices that need to communicate with each other without holding up a thread on either end, the communication framework should be used is a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available.

REST is a software architectural style which is used in defining the set of rules that be used for the creation of web services. The REST architecture allows requesting systems to be able to access and manipulate web resources.

8 0
2 years ago
Iven the code fragment below with nested if statements, rewrite the code to combine all the tests into one if statement with mul
Georgia [21]

Answer:

See Explanation Below

Explanation:

The new code segment is

int feb = 28;

if ((year % 4) == 0 && (year % 100) != 0) // assume that year is an integer with a valid year value

{

System.out.println("This is a leap year");

feb = 29;

}

Assume year = 2020, the assigned value of feb is 29;

Reason below;

At line 2 of the new code segment, two conditions are tested both of which must be satisfied.

1. year % 4 == 0

2020 % 4 = 0

0 = 0 (True)

2. year % 100 != 0

2020 % 100 != 0

20 != 0 (True)

Since both conditions are true, the value assigned to feb will be 29 and

"This is a leap year" will be printed without the quotes

8 0
3 years ago
Read 2 more answers
Unwanted or unneeded software included by manufacturers on new computers is called
Travka [436]
The answer is called bloatware. This is unneeded files that are actually on the computers which are already there even if it's new. It doesn't have any essential function and sometimes is a trial version. The application also adds up space which limits your free space storage. In other words, because it has no significant tasks to handle it is unnecessary, but it only serves as an additional profit to the company once it is purchased by the buyer.

Bloatware may also come especially in adware where a lot of extension applications are sometimes automatically installed after it is allowed to operate in just a click. The only solution for a bloatware is to uninstall it.  .
5 0
3 years ago
Other questions:
  • Write a program that requests a state abbreviation as input and displays the justices appointed from that state. The justices sh
    6·1 answer
  • Net Worth is equal to assets minus liabilities. Which event will have the greatest impact (positive or negative) on one's net wo
    9·1 answer
  • True / False
    5·1 answer
  • A network host with an IP address of 192.168.10.200 wants to send a message to a destination computer with an assigned IP addres
    6·1 answer
  • What key should you press and hold to select and open multiple files at one time? Enter Alt Control Esc
    12·2 answers
  • A customer comes into a computer parts and service store. The customer is looking for a device to help a person with accessibili
    5·1 answer
  • Write a program to convert a fraction to a decimal. Have your program ask for the numerator first, then the denominator. Make su
    10·1 answer
  • How can you tell that a spreadsheet was saved as a 2007 Excel file?
    7·1 answer
  • The show ip dhcp binding command displays _____. (Points : 5) the MAC table cache information
    7·1 answer
  • Resource _____ let you view, manage, and automate tasks on multiple aws resources at a time.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!