1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
S_A_V [24]
2 years ago
6

Explain the types of network architecture with their merits and demerits

Computers and Technology
1 answer:
Tasya [4]2 years ago
8 0

Answer:

First and foremost, what is network architecture? It's basically the physical and logical design which refers to the software, hardware, protocols and the media of transmission of data. Simply put, it refers to how computers are organized and how tasks are allocated among these computers. The two types of widely used network architectures are peer-to-peer aka P2P and client/server aka tiered.

Peer-to-Peer Architecture

In a peer-to-peer network, tasks are allocated to every device on the network. Furthermore, there is no real hierarchy in this network, all computers are considered equal and all have the same abilities to use the resources available on this network. Instead of having a central server which would act as the shared drive, each computer thats connected to this network would act as the server for the files stored on it.

You might be interested in
Question 8 of 25
denis23 [38]

Answer:

D to Protect sensitive data, Enterprise has certain security features and is mostly used in business settings.

5 0
2 years ago
What is an example of technology that helps support the idea of continental drift.
docker41 [41]

I don't know technology, but using Satellite images, we are able to see that the continents once fitted into one 'jigsaw'. This shows that the continents must have drifted to its original place. Furthermore, Geothermal stations have pointed out convection currents in the Earth's mantle has caused the movement of crusts.
8 0
3 years ago
In designing input by clinicians for an EHR system, which of the following would be effective for a clinician when the data are
svetoff [14.1K]

Answer:

Speech recognition

Explanation:

Speech recognition would be effective for a clinician when data entry is fairly repetitive and the vocabulary used is fairly limited and over time it as become a replacement for other forms of dictation.

3 0
3 years ago
A(n) ________ virus runs a program that searches for common types of data files, compresses them, and makes them unusable.
ad-work [718]

Answer:

encryption

Explanation:

A(n) encryption   virus runs a program that searches for common types of data files, compresses them, and makes them unusable.

5 0
3 years ago
A type of technology that can be attached to a tag and used to identify postal packages is a(n)
deff fn [24]

Answer: bar code

Explanation: that is what it is

5 0
3 years ago
Other questions:
  • A method in a class that modifies information about an object is called a/an ____ method.
    14·1 answer
  • T F The scope of a parameter is limited to the function which uses it.
    12·1 answer
  • With _______, applications are owned, delivered and managed remotely by one or more providers over the Internet or an intranet,
    15·1 answer
  • The marketplace for computer hardware:________ 1. has become increasingly concentrated in top firms 2. has expanded to include a
    5·2 answers
  • This function whose primary purpose is to display information to the user can only display one value at a time.
    15·1 answer
  • This is for career exploration, I need help please! <3 HELPPPP
    8·2 answers
  • Role of memory in a computer system
    10·1 answer
  • )
    11·1 answer
  • These 2 questions PLEASEEE (:
    14·1 answer
  • What is the difference between a general ai as opposed to a specialized ai?.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!