1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
S_A_V [24]
2 years ago
6

Explain the types of network architecture with their merits and demerits

Computers and Technology
1 answer:
Tasya [4]2 years ago
8 0

Answer:

First and foremost, what is network architecture? It's basically the physical and logical design which refers to the software, hardware, protocols and the media of transmission of data. Simply put, it refers to how computers are organized and how tasks are allocated among these computers. The two types of widely used network architectures are peer-to-peer aka P2P and client/server aka tiered.

Peer-to-Peer Architecture

In a peer-to-peer network, tasks are allocated to every device on the network. Furthermore, there is no real hierarchy in this network, all computers are considered equal and all have the same abilities to use the resources available on this network. Instead of having a central server which would act as the shared drive, each computer thats connected to this network would act as the server for the files stored on it.

You might be interested in
A user’s laptop hard drive contains sensitive information. The user often plugs the laptop into the corporate network. A sensiti
jekas [21]

Answer:

the user should disable file and print sharing on the laptop

Explanation:

According to my research on information technology and cyber security, I can say that based on the information provided within the question in order to prevent this the user should disable file and print sharing on the laptop. This is because this file and printer sharing allows users to see your files that you have available as shared and copy or print those files. Which if they are sensitive data you should just disable this option so that people on the same network cannot see or access these files.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
Is ryzen really better for all-around purpose, and intel is better for gaming?
barxatty [35]

Answer:

Its really personal preference G.

Explanation:

But what you said is about right.

6 0
3 years ago
ÍS THERE ANY TECH GUY OR SOMEONE WHO UNDESTAND ABOUT UNINSTALLING?
marysya [2.9K]
Well, dont know ;-: PROBLEM?
6 0
3 years ago
What type of open source programming language is python
Vlada [557]

Answer:

Python is developed under an OSI-approved open source license, making it freely usable and distributable, even for commercial use. Python's license is administered by the Python Software Foundation.

Explanation:

g00gle

3 0
2 years ago
What is computer hacking?
tangare [24]

Answer:

<h3><u>Computer hacking:-</u></h3>

  • Computer hacking is the act of compromising digital devices and networks through unauthorized access to an account or computer system.

  • Hacking is not always a malicious act, but it is most commonly associated with illegal activity and data theft by cyber criminals.
6 0
3 years ago
Other questions:
  • Drag the tiles to the correct boxes to complete the pairs.
    7·2 answers
  • PLEASE PLEASE PLEASE HELP!! WILL GIVE A BRAINLIEST IF UR RIGHT!!
    14·1 answer
  • How does technology improve productivity at home? (Select all that apply.)
    5·1 answer
  • Which word goes with "meals
    5·2 answers
  • After you have created at least four slides, a scroll bar containing scroll arrows and scroll boxes will appear on the right edg
    9·1 answer
  • Write a program that dose the following:
    9·1 answer
  • Similarities between inline css and internal css​
    6·1 answer
  • I live in Pennsylvania which observes eastern standard time.
    13·1 answer
  • Discuss the impact printer and its types in detail?
    7·1 answer
  • Which button in the Sort &amp; Filter gallery of the Data tab would alphabetize from A to Z quickly?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!