1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scoray [572]
4 years ago
5

What type of network does not have centralized control, such as one in a small office or home office?

Computers and Technology
1 answer:
ella [17]4 years ago
7 0
The answer is P.2.P

:)
You might be interested in
What is the code for Pong that would work on Khan Academy?
Rashid [163]
Draw = function() {
if () {
if (keyCode === ){
();
}
else if (keyCode === ) {
();
}
}
};
7 0
3 years ago
In Full Screen Reading View, which area is reduced?
REY [17]

Go to options .

  • Suppose you are reading a document .
  • You want to read in full screen .
  • Hence the Go-to bar will be reduced .
6 0
3 years ago
A function is a built-in formula in a spreadsheet. <br> a. True<br> b. False
Anna11 [10]
YES its TRUE the answer is A. true. Spreadsheet is like excel that contains built in formula and ready to use. You just have to explore more on its environment and research more about the spreadsheet so that your work will easily be done
5 0
3 years ago
Read 2 more answers
Most information security incidents will occur because of _________. Select one: a. Users who do not follow secure computing pra
nika2105 [10]

Answer:

Users who do not follow secure computing practices and procedures

Explanation:

Most data breaches that occur as a result of hacking and cyber-attacks get all the attention. However, the kind of mistakes that employees make in corporate situations can sometimes be very costly. Whether accidental or not, human error is the leading cause of most information security breaches. When you have proper policies, people working in big organizations, for instance, will know how they are to do with them. Organizations should put more effort on its employees. By ensuring that secure computing practices and procedures are followed, it will help guide the workforce more effectively.

4 0
4 years ago
again assume that each of the resistors in the circuit shown above has a resistance value of 100k(question in the picture above)
Svetllana [295]
Statement A is true. R4 is not part of the circuit since it has one terminal not connected. The other resistors are in series, so the same current flows through them. Hence they will dissipate equal power.
4 0
3 years ago
Other questions:
  • A network technician has configured a point-to-point interface on a router. Once the fiber optic cables have been run, though, t
    12·1 answer
  • A drivers touches a cars steering wheel on a hot day which term refers to the way heat is transferredd to the drivers hand
    6·2 answers
  • 1).
    12·1 answer
  • What do u call a individual that loves motor bikes and leather and is in a rival group known as mods?
    5·1 answer
  • Suppose an instruction takes 4 cycles to execute in an unpipelined CPU: one cycle to fetch the instruction, one cycle to decode
    10·1 answer
  • How many people watch Anime in the world?
    15·2 answers
  • Type the correct answer in the box. Spell all words correctly.
    11·2 answers
  • From which type of data storage does the CPU load information for processing during normal operation?
    14·1 answer
  • The process of learning by making mistakes and by trial and error is called _____.
    6·1 answer
  • THIS IS TIMED PLS HURRY UP
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!