Answer:
For maximum interoperability, NFSv4 is recommended.
Explanation:
When setting up a network of mostly windows machines, it is better to use NFSv4 because it includes performance improvements, mandates strong security, and a stateful protocol.
Answer: review; quality
Explanation:
SQA refers to the ongoing process that can be found in the Software Development Life Cycle whereby the developed software is checked in order to ensure that the desired quality measures are met. The SQA processes is vital as it checks for the quality in every development phase.
The first step of the SQA process is to (review) the software development process. The next step is to set (quality) attributes.
The answer would be d, none kf the above.
The wireless security technology contains significant flaws and should never be used is Wired Equivalent Privacy (WEP).
<h3>What is the primary weakness of Wired Equivalent Privacy WEP )?</h3>
Wired Equivalent Privacy (WEP) is known to be a kind of a security protocol, that is seen in the IEEE Wireless Fidelity (Wi-Fi) standard known to be 802.11b.
Note that the primary weakness of wired equivalent privacy (WEP) is that It functions only on some given brands of APs and as such, The wireless security technology contains significant flaws and should never be used is Wired Equivalent Privacy (WEP).
Learn more about wireless security from
brainly.com/question/25633298
#SPJ1
Answer:
Primary memory is directly accessible by Processor/CPU. Secondary memory is not directly accessible by the CPU. ... The memory devices used for primary memory are semiconductor memories. The secondary memory devices are magnetic and optical memories