1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Darina [25.2K]
3 years ago
15

A(n) ____________ network should NOT be used when there are more than about twenty-five computers. Select one: a. Ring b. Ethern

et c. Peer-to-peer d. Client/server
Computers and Technology
1 answer:
nata0808 [166]3 years ago
8 0
D the answer is client and server I believe
You might be interested in
When you right-click certain areas of the Word or other Office app windows, a command menu will appear. Group of answer choices
klasskru [66]

Answer:

The answer is "False".

Explanation:

In the word or other office application when we right-click on a certain area of the office, it will provide a common task, like double-click and pick objects.

  • The right mouse button also refers to use and open the pop-up menu, which changes depending on where you select.
  • It allows the computer to mouse additional features, typically known as an optional lowering screen, that's why the given statement is "false".
3 0
4 years ago
What type of malicious computer programs present themselves as useful computer programs or applications?
erastova [34]

Answer:

The correct answer to the following question will be "Trojan programs".

Explanation:

  • A trojan is a kind of software often identified as legal applications. Internet-thieves and hackers will hire Trojans and they were trying to access to consumer programs. Users are usually fooled into launching and operating Trojans on their devices by a certain form of economic manipulation.
  • It's a kind of malicious software that express themselves as helpful applications and programs.

Therefore, the Trojan program is the right answer.

5 0
3 years ago
Read 2 more answers
You have been asked to configure a client-side virtualization solution with three guest oss. Each one needs internet access. How
ArbitrLikvidat [17]

The most cost-effective way to configure a client-side virtualization solution is by using one (1) physical NIC, three (3) virtual NICs, and one (1) virtual switch.

<h3>What is virtualization?</h3>

Virtualization refers to the creation of an abstraction layer over computer hardware through the use of a software, in order to enable the operating system (OS), storage device, server, etc., to be used by end users.

In this scenario, the most cost-effective way to configure a client-side virtualization solution is by using one (1) physical network interface card (NIC), three (3) virtual network interface cards (NICs), and one (1) virtual switch.

Read more on virtualization here: brainly.com/question/14229248

#SPJ1

4 0
2 years ago
Which of the following tactics can reduce the likelihood of injury?
vova2212 [387]

Answer:

the answer is the use of tools that reduce the need for repetitive action

Explanation:

this  is the answer because with the use of these tools there is less of a chance of injury because there is less time and opportunity for this to happen with the lack of need of repetition

4 0
4 years ago
You may not make a U-turn in front of a fire station. True or False?
emmasim [6.3K]
True because you can’t use a fire station to turn around.
8 0
3 years ago
Read 2 more answers
Other questions:
  • A(n) ____ tag is used to let the compiler know that your intention is to override a method in a parent class
    10·1 answer
  • Technician A says that a cracked exhaust manifold can affect oxygen sensor operation. Technician B says that a clogged air filte
    7·1 answer
  • Based on your understanding of Moore’s Law, what do you predict will be the next trend in the evolution of computers?
    10·1 answer
  • Which terms represent the two types of client requirements?
    14·1 answer
  • What is the maximum duration of daily Scrum meetings?
    13·1 answer
  • What is the value of i printed? j = i = 1 i += j + j * 5 print("What is i?", i)
    11·1 answer
  • Is 583 a string or a number?
    13·2 answers
  • Which vulnerability can occur if a programmer does not properly validate user input and allows an attacker to include unintended
    13·1 answer
  • A large retail company hires several new joiners and would like to incorporate Virtual Reality (VR) into their onboarding proces
    11·1 answer
  • A _____ consists of horizontal bars, connected with arrows that indicate task dependencies.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!