1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LenaWriter [7]
3 years ago
8

1-5. Discuss briefly the function and benefits of computer network. (5pts​

Computers and Technology
1 answer:
Elden [556K]3 years ago
7 0

Computer networks allow an unlimited amount of computers to communicate with each other. This is especially useful in enterprise environments, as technicians have to deal with hundreds of computers at a time. Computer networks make it easier to share files, increase storage capacity, better communication, easier to to control computers remotely, easier to share resources, ability to share a single internet connection on multiple devices. Computer networks also have a lot of cost benifits too, as network administration is centralised, meaning that less IT support is required, and you can cut costs on sharing peripherals and internet access.

Hopefully this helps you out!

You might be interested in
Suppose that you have created a program with only the following variables.int age = 34;int weight = 180;double height = 5.9;Supp
Yuri [45]

Answer:

a. calculate(age, weight); // This is legal

b. calculate(age, height); // This is legal

c. calculate(weight, height); // This is legal

d. calculate(height, age); // This is not legal

e. calculate(45.5, 120); // This is not legal

f. calculate(12, 120.2); // This is legal

g. calculate(age, size); // This is not legal

h. calculate(2, 3); // This is legal

i. calculate(age); // This is not legal

j. calculate(weight, weight); // This is legal

Explanation:

a. This is legal because the argument passed are two in numbers and they are integers but the integer for the second parameter can be cast to double.

b. This is legal because the method requires two parameter and two are passed. The method requires integer and double. The passed parameter are integer and double.

c. This is legal because the method requires two parameter and two are passed. The method requires integer and double. The passed parameter are integer and double.

d. This is not legal because even though two parameters were passed. The first one should be int but double was supplied and double cannot be downgraded to int. There is a possible lossy conversion from double to int.

e. This is not legal because even though two parameters were passed. The first one should be int but double was supplied and double cannot be downgraded to int. There is a possible lossy conversion from double to int.

f. This is legal because the method requires two parameter and two are passed. The method requires integer and double. The passed parameter are integer and double.

g. This is not legal because even though two parameters were passed. The first one should be int but the second parameter is not defined before been passed to the calculate method.

h. This is legal because the argument passed are two in numbers and they are integers but the integer for the second parameter can be cast to double.

i. This is not legal because only one parameter was passed instead of two.

j. This is legal because the argument passed are two in numbers and they are integers but the integer for the second parameter can be cast to double.

3 0
3 years ago
E-mail is the most common distributed application that is widely used across all architectures and vendor platforms.a) trueb) fa
Advocard [28]

Answer:

A. True.

Explanation:

E-mail is an acronym for electronic mail and it can be defined as an exchange or transmission of computer-based data (messages) from one user to another over a communications network system.

Also, a distributed application refers to a software program that is capable of running on several computer systems and can communicate effectively through a network.

E-mail is the most common distributed application that is widely used across all architectures and vendor platforms because it primarily operates on a client-server model, by providing users with the requested services through the Simple Mail Transfer Protocol (SMTP) using the standard port number of 25.

7 0
3 years ago
¿Cuánta energía consumirá una lavadora de 1200W de potencia, si se deja conectada durante 20 horas? ¿Cuánto deberemos pagar si e
9966 [12]

Answer:

The amount to be paid is €2.88 for the amount of power consumed

Explanation:

The first thing to do here is to convert the power consumption to kilo-watt

1 kilowatt = 1000 watt

x kilowatt = 1200 watt

x = 1200/1000 = 1.2 KW

we now convert this to kilowatt hour by multiplying the number of hours by the number of kilowatt.

That would be 20 * 1.2 = 24 KWh

Now, the charge is 0.12€/kWh

for 24 kWh, we have 24 * 0.12 = €2.88

6 0
3 years ago
What is the answer ??​
Anna11 [10]

Answer:

option 1 is correct go with 1s .

3 0
3 years ago
Question 1 :George, a user, is having trouble connecting to network resources, including shared folders on the local network and
vazorg [7]

Complete Question:

George, a user, is having trouble connecting to network resources, including shared folders on the local network and Internet resources. Yesterday he was able to connect with no problems. You need to ensure that he can connect to these resources. Which tool should you use FIRST?

Group of answer choices

A. ipconfig

B. Device Manager

C. My Network Places

D. Control Panel

Answer:

A. ipconfig

Explanation:

As a network administrator, to ensure that George can connect to the network resources, shared folders, and internet resources, the tool you should use first is the "ipconfig" in the command line. This is a troubleshooting process that would help to identify the problem and to establish a theory of probable cause.

<em>Since George could connect the previous day without any problem, it is most likely that the TCP/IP settings has been altered. Therefore, to view this settings you'll have to use an ipconfig command. </em>

4 0
4 years ago
Other questions:
  • What's the minimum number of ip addresses that a router must have?
    6·1 answer
  • The network layer, or osi layer 3, provides services to allow end devices to exchange data across the network. to accomplish thi
    15·1 answer
  • One metric ton is approximately 2,205 pounds.
    6·1 answer
  • A typical item in a plan of procedure includes the name of the part of the ______ to
    5·1 answer
  • In database transaction concurrency, the lost update anomaly is said to occur if a transaction Tj reads a data item, then anothe
    6·1 answer
  • 3 Points
    15·2 answers
  • Jeremy is working with a team that is creating an application using attributes and associated methods. What type of programming
    8·1 answer
  • Explain the following as used in Tally Accounting Software:
    8·1 answer
  • Indicate whether the statement is true or false. ____ 1. Autoglobal array elements are referred to with an index number. ____ 2.
    9·1 answer
  • What do you think is the importance of Science Technology and Society​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!