1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Morgarella [4.7K]
3 years ago
3

Case Project 9-2: Peer-to-peer or server-based network?CNT Books hired you as a productivity consultant. Currently, it employs s

ix people who will be moving into new office space. You are to configure a network that allows them to share files and printers. Employees must also be able to control resources on their own machines. The company wants the least expensive solution and only minimal training for employees.a. Would you choose a peer-to-peer network or a server-based network?b. Write a list of supplies you might need to purchase to perform this task.c. What computer configuration tasks might you need to perform?
Computers and Technology
1 answer:
AveGali [126]3 years ago
5 0

Answer:

A peer-to-peer based network with a star topology with all six computers connected to a layer two networking switch and configured with static IP addresses

Explanation:

In peer-tp-peer based computer networks, computers or workstations are configured to maintain their respective storage and data for each other computers or workstations can access by connecting to its public storage area. Network resources like printers and scanners are shared by the devices in the network.

Server-based networks centralize data and other actions like IP addressing for easy and fast network configuration.

You might be interested in
In order for an IT security framework to meet information assurance needs, the framework needs to include policies for several a
Ugo [173]

Answer:

(1) Protecting the privacy of personal data and proprietary information

(2) Proprietary Information

These two cannot be infringed on but below are the policies that must be taken in high esteem and can be infringed upon

(1) Disaster Recovery Policy

(2) Acceptable Use Policy

(3) Business Continuity plan

4 0
3 years ago
Which hardware device should he consider upgrading in order to increase the system's storage space?
Mademuasel [1]
The hard drive because this is where all the information is stored.
7 0
4 years ago
FREE POINTS FIRST TO ANSWER GETS BRANLIEST!!! :)
kicyunya [14]

Answer:

THX

Explanation:

4 0
3 years ago
Read 2 more answers
______ allows a thread to run on only one processor.
charle [14.2K]
Your answer will be A.
4 0
4 years ago
Consider this program segment: int newNum = 0, temp; int num = k; // k is some predefined integer value 0 while (num > 10) {
Doss [256]

Answer:

All of these statements are true.

Explanation:

Since the while loop is reversing the integer number and leaving the highest order digit in the num and stores the reversed number in the newNum variable.

It skips one digit so if the num is in the range of [100,1000] it will result in a number between 10 and 100.

This loop can never go in infinite loop for any initial value of num because the loop will run as many times as the number of digits.

and if the value of the num is <=10 the while loop will never run and the value of newNum will be 0.

6 0
4 years ago
Other questions:
  • Each peripheral device has its own software, called a(n) ____, which contains the detailed instructions required to start that d
    6·1 answer
  • How to create a function, called separate_int_and_str, which takes in a list and separates out the integer values and strings in
    9·1 answer
  • What are the desirable qualities of a Product Vision?
    11·1 answer
  • Which tab is used to edit objects on the slide master and layouts
    10·1 answer
  • In statistics the mode of a set of values is the value that occurs most often. Write a program that determines how many pieces o
    10·1 answer
  • Which event most led to a reduction in the size and cost of computers? a. invention of the Bessemer converter b. development of
    8·2 answers
  • When designing a suitable and safe flexibility training program, you should set reasonable and appropriate goals depending on wh
    15·1 answer
  • Given the network 192.168.100.0/24, we are going to segment this network into two subnets, Subnet A and Subnet B. The hosts requ
    10·1 answer
  • the default name for the small icon that represents a web site or page, and is displayed in the browsers, typically at the begin
    9·1 answer
  • What is the command to list files in Unix and Unix like operating system?​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!