1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
S_A_V [24]
2 years ago
6

Explain the types of network architecture with their merits and demerits

Computers and Technology
1 answer:
Tasya [4]2 years ago
8 0

Answer:

First and foremost, what is network architecture? It's basically the physical and logical design which refers to the software, hardware, protocols and the media of transmission of data. Simply put, it refers to how computers are organized and how tasks are allocated among these computers. The two types of widely used network architectures are peer-to-peer aka P2P and client/server aka tiered.

Peer-to-Peer Architecture

In a peer-to-peer network, tasks are allocated to every device on the network. Furthermore, there is no real hierarchy in this network, all computers are considered equal and all have the same abilities to use the resources available on this network. Instead of having a central server which would act as the shared drive, each computer thats connected to this network would act as the server for the files stored on it.

You might be interested in
How do you award a brainliest
erik [133]

Answer: Usually there has to be 2 answers. When you go to the answers on your question there should be a outlined crown or something like that, then you click that.

8 0
2 years ago
Read 2 more answers
Convert the binary number into a hexadecimal number.
Anarel [89]

Explanation:

A binary number is converted to hexadecimal number by making a group of 4 bits from the binary number given.Start making the group from Least Significant Bit (LSB) and start making group of 4 to Most Significant (MSB) or move in outward direction.If the there are less than 4 bits in last group then add corresponding zeroes to the front and find the corresponding hexadecimal number according to the 4 bits.For example:-

for this binary number 100111001011011.

100  <u>1110</u> <u>0101</u>  <u>1011</u>

There is one bits less in the last group so add 1 zero(0) to it.

<u>0100</u>  <u>1110</u>  <u>0101</u>  <u>1011</u>

  4        E        5        B

100111001011011 = 4E5B

101011.1010

<u>0010</u>   <u>1011</u>  .   <u>1010</u>

  2          B           A

=2B.A

6 0
3 years ago
It connects computers in different cities and different countries
svetoff [14.1K]

Answer:

I think VPN firewall devices can do that.

5 0
3 years ago
Read 2 more answers
Tinh T = a1*a2*a3*...an<br><br> Giúp em với
Studentka2010 [4]

Answer:

??????

Explanation:

??????? okay okay

3 0
2 years ago
Windows stores information from the Credential Manager application in secure folders called
Delicious77 [7]

Windows stores information from the Credential Manager application in secure folders called<u> VAULTS.</u>

<u></u>

Explanation:

  • A credential vault is a database used to store passwords and similar cryptographic key material.
  • The most common data stored in a credential vault are current and historical passwords to privileged accounts.
  • All credentials are saved in special folders on the computer, a place called Vaults. Moreover, you can back up all credentials to a file and restore them on to different computer.
  • Vault is a shareware program that acts as a bank vault, or safe, where you can keep you private information or files hidden and secure.
  • Everything in the vault is protected with an advanced encryption, and requires a password (your password) to open the vault to access the information.
8 0
2 years ago
Other questions:
  • What can search the Internet and select elements based on important words?
    6·2 answers
  • Which of the following are not deducted on a typical pay stub
    12·1 answer
  • Select the correct answer.
    13·1 answer
  • All mla text is double spaced. true false
    13·2 answers
  • Which statement best describes antivirus software?
    13·1 answer
  • Select the correct answer.
    9·1 answer
  • Stock Market
    11·1 answer
  • Assume that x and y are boolean variables and have been properly initialized. !(x || y) || (x || y) The result of evaluating the
    10·1 answer
  • What statement describes the last step in evaluating<br> information?
    10·1 answer
  • Most scheduling algorithms maintain a run queue, which lists processes eligible to run on a processor. On multicore systems, the
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!