1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Morgarella [4.7K]
2 years ago
3

Case Project 9-2: Peer-to-peer or server-based network?CNT Books hired you as a productivity consultant. Currently, it employs s

ix people who will be moving into new office space. You are to configure a network that allows them to share files and printers. Employees must also be able to control resources on their own machines. The company wants the least expensive solution and only minimal training for employees.a. Would you choose a peer-to-peer network or a server-based network?b. Write a list of supplies you might need to purchase to perform this task.c. What computer configuration tasks might you need to perform?
Computers and Technology
1 answer:
AveGali [126]2 years ago
5 0

Answer:

A peer-to-peer based network with a star topology with all six computers connected to a layer two networking switch and configured with static IP addresses

Explanation:

In peer-tp-peer based computer networks, computers or workstations are configured to maintain their respective storage and data for each other computers or workstations can access by connecting to its public storage area. Network resources like printers and scanners are shared by the devices in the network.

Server-based networks centralize data and other actions like IP addressing for easy and fast network configuration.

You might be interested in
Which of the following describes fair queuing? A technique of load balancing that operates by sending the next transaction to th
Galina-37 [17]

Answer:

a. a technique of load balancing that operates by sending the next transaction to the firewall with the least current workload

Explanation:

A technique of load balancing that operates by sending the next transaction to the firewall with the least current workload describes fair queuing.

6 0
2 years ago
Read 2 more answers
Why do you think they added the wait .5 seconds block?
barxatty [35]

Answer:

Satisfaction

Explanation:

People enjoy the sensation of the computer doing something and the feeling that the program is advanced.

3 0
2 years ago
What is are motor vehicle emissions?
saul85 [17]

Exhaust gas or flue gas is emitted as a result of the combustion of fuels such as natural gas, gasoline, petrol, biodiesel blends, diesel fuel, fuel oil, or coal. It's pretty much exhaust gas.

7 0
2 years ago
3. Discuss microprocessor components, chips,
MaRussiya [10]

Answer:

3

Microprocessor Components

Control Unit.

I/O Units.

Arithmetic Logic Unit (ALU)

Registers.

Cache.

The chips capacities express the word size, 16 bits, 32 bits, and 64 bits. The number of bits determined the amount of data it can process at one time

The specialty processors are specifically designed to handle special coprocessor and Graphics Processing Unit (GPU), like displaying 3D images or encrypting data.

5

slot machine, known variously as a fruit machine, puggy, the slots, poker machine/pokies, fruities or slots, is a gambling machine that creates a game of chance for its customers.

A video card (also called a graphics card, display card, graphics adapter, or display adapter) is an expansion card which generates a feed of output images to a display device (such as a computer monitor).

network interface controller is a computer hardware component that connects a computer to a computer network. Early network interface controllers were commonly implemented on expansion cards that plugged into a computer bus.

wireless network interface controller is a network interface controller which connects to a wireless network, such as Wi-Fi or Bluetooth, rather than a wired network, such as a Token Ring or Ethernet.

The standard SD card has dimensions of 32 mm by 24 mm by 2.1 mm, a storage capacity of up to 4 GB. Typical levels of performance are not as high as the other types of SD memory card mentioned below.

good luck!!!

4 0
2 years ago
A disgruntled employee can harm a company by launching a computer virus, changing or deleting files, or exposing system password
Setler [38]

Answer:

Threat disgruntled employees

Explanation:

This is a type's threat in a network, why disgruntled employees is a threat?

Because disgruntled employees can implement a plant to damage a company's system when an IT employee be fired.

I t can be difficult to try to protect a system of these threats, Traditionally companies can wait for the less damage, then delete those credentials.

In cloud computing we have IDaaS, where an external company administers the company's credentials, is harder to damage the system in this way.

5 0
2 years ago
Other questions:
  • Explain the system software​
    10·2 answers
  • Explain The main distinction between an ap course and a dual enrollment course.
    13·1 answer
  • In 1970's what company developed computers innvations such as mouse. graphical user interface and word processors
    8·1 answer
  • Fatal error: Class 'Drush\Commands\DrushCommands' not found in /Users/amy/testsite/Sites/acquia dev desktop/fresh-install/module
    7·1 answer
  • Chris accidentally steps on another student’s foot in the hallway. He apologizes, but the other student does not want to hear it
    15·2 answers
  • Helpppppppp!!!!!!!! Some program menus are the same in every program you open. Under the File menu, all of the following are the
    15·2 answers
  • Which system board has a 64-bit bus?
    7·1 answer
  • What is the definition of trouble shooting.
    12·1 answer
  • Develop a stored procedure that will take a state abbreviation as a parameter and list the name of the state, vendor, and total
    9·1 answer
  • Can someone help me with this question, i know all except psuedocode, help me please
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!