1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KatRina [158]
3 years ago
7

A small company is setting up a new remote satellite office. Employees in the remote office need to access network resources fro

m the main office of the company. An IT manager is deciding whether to deploy thin or thick clients at the remote office. What is the key technical factor to be considered?
Business
1 answer:
nadya68 [22]3 years ago
7 0

Answer:

The reliability of the server is the key technical factor to be considered. In <em>thin client </em>architectures, the data processing is transferred on to the server. In these scenarios, the operating of the remote satellite office would downfall if something bad happened with the server.

Similarly, if the <em>response time</em> is critical (real-time processing is essential for business operating), the company should consider implementing a thick client, which is faster and more reliable. However, thick clients are almost always more expensive to implement.

You might be interested in
1. Do you believe that training is a necessity in the implementation of new policies? Please support your answers.
professor190 [17]

Answer: (1) Training is necessary in the implementation of a new policy

(I) To orient and enlightening the people

(II) To enhance its implementation

(III) To promote cordial actions.

(2) Background checks are important to

(I) To determine the possible threats.

(II) To understand the nature of threats and how best to mitigate them.

(III) To help the Management know what kind of information security structure or system to implement.

(2B) Information security help to serve the following

(I) To prevent hacking and other possible threats

(II) To prevent Information leaks

(III) To promote secrecy.

(3) What can happen if Management does not enforce the policies that are put in place?

(I) The business will experience huge looses due to hackers

(II) The Business will be prone to internet fraud.

(III) Frequent Information leaks.

Explanation: Information security is the process or system put in place to enhance,sustain and guarantee that the information flow,storage and use are done with reduced or eliminated threats.

Most organisations have different strategies for implementing Information security, Information security is vital to the success of any business.

8 0
3 years ago
________ are hired as needed and are not part of the organization's permanent workforce. select one:
Brrunno [24]
C. Independent contractors
5 0
3 years ago
Which statement applies to the commodities exchange?
svetlana [45]

Answer:try D

Explanation:

3 0
3 years ago
11. If you want to have a return for your Final Portfolio (that is invested between Optimal Risky portfolio and Risk Free Securi
melamori03 [73]

Answer:

Answer is explained in the explanation section.

Explanation:

Note: First of all, this question is incomplete and lacks necessary data to calculate this question. However, I have found the similar question on the internet with complete data given. Additionally, I have shared that data as well in the attachment below for your convenience, Thanks.

Solution:

SD = Standard Deviation

Using utility function, E(R) = Rp - 0.005 x A x SD^{2} = 1.34 - 0.005 x 3x 4.06^{2}

Using utility function, E(R) = 1.093%

If the weight in the risky portfolio is let's say, "a" then,

weight in the risk-free asset = 1 - a

So,

E(R) = a x Rp + (1 - a) x Rf

1.093% = a x 1.34% + (1 - a) x 0.50%

Solving for "a"

a = 70.56% - weight in risky portfolio

and 1 - a = 29.44% - weight in risk-free asset.

Similarly, if you want a return of 1.10%,

we can follow the above steps and get

1.1% = a x 1.34% + (1 - a) x 0.5%

Weight in risky portfolio,

a = 71.43%

weight in risk-free asset,

1 - a = 28.57%

5 0
2 years ago
Lipstik, Inc. makes cosmetics. Lipstik intentionally mislabels its packaged products to conceal a defect. Trusting and relying o
Zanzabum

Answer:

Fraud.

Explanation:

Fraud is defined as intentional misrepresentation aimed at gaining unlawful advantage or to deprive a victim of a legal right.

In civil law the victim can file for recovery of money, while in criminal law the fraud perpetrator may be committed to prison.

Lipstik intentionally mislabels its packaged products to conceal a defect, and gains unfair advantage by selling these defective goods to customers. Mikayla buys the lipstick based on the misrepresented information on the label and gets injured.

8 0
2 years ago
Other questions:
  • Preston Products provides the following data for the year: Actual production and sales for the year 195 units Budgeted productio
    10·2 answers
  • What is the corruption perceptions index (cpi)?
    13·1 answer
  • The corporate charter of Alpaca Co. authorized the issuance of 10 million, $1 par common shares. During 2018, its first year of
    6·1 answer
  • 5 years ago,an individual has invested $10,000 in aninvestment trust. Over those years, the trust has distributed $2,000, consis
    7·1 answer
  • Ervin Company uses the allowance method to account for uncollectible accounts receivable. Bad debt expense is established as a p
    5·1 answer
  • There is an inverse relationship between bonds' quality ratings and their required rates of return. Thus, the required return is
    15·1 answer
  • the real risk rate of interest is 2.5% and inflation is expected to be 3% this year and 3.5 during the next three years assume t
    12·1 answer
  • Project L costs $45,000, its expected cash inflows are $11,000 per year for 8 years, and its WACC is 8%. What is the project's d
    14·1 answer
  • When rival firms compete aggressively by trying to attract competitors' customers, this might be an indication of: a. increasing
    7·1 answer
  • _____ is the most common, real-world method of estimating projects. Group of answer choices Delphi Technique Time Boxing Bottom-
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!