1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lelechka [254]
4 years ago
6

What is a benifit of having a client/server network?

Computers and Technology
1 answer:
podryga [215]4 years ago
4 0
There are advantages and disadvantages to both peer-to-peer and client-server networks; however, in general, small businesses benefit more from a client-server network designed to maximize your employees' productivity through enhanced security, reliability, and accessibility features.
You might be interested in
There are only three active stations in a slotted aloha network: a, b, and
Eduardwww [97]

gfdsgcvbcvxbxcvxcdzgdfhggfdjghfb ccvghfjghjgh

7 0
3 years ago
Which of the following menu commands would you select to make a copy of an open file and rename it
egoroff_w [7]
The menu command that you would <span>select to make a copy of an open file and rename it is SaveAs. </span>
5 0
4 years ago
Read 2 more answers
Which structural adaptation would help a plant survive better in a shady environment?
Aleks04 [339]
C. Large Leaves

Explanation:
Large leaves enable the plant to absorb more of the scarce sunlight it recieves, so it can create enough nutrients for it to survive. Plants need sunlight to perform photosynthesis. Photosynthesis is when a plant takes in sunlight and turns it into food for itself.

Hope this helped!!
4 0
3 years ago
Read 2 more answers
Which of the following statement is true for Service Request Floods A. An attacker or group of zombies attempts to exhaust serve
klio [65]

Answer:

The answer is "Option A and Option B"

Explanation:

This is a type of attack, which is mainly used to bring down a network or service by flooding large amounts of traffic. It is a high-rate server from legitimate sources, where an attacker or group of zombies is attempting to drain server resources by creating and disconnecting the TCP link, and wrong choices can be described as follows:

In option C, It can't initiate a single request because when the servers were overloaded with legitimate source links, the hacker may then set up and uninstall TCP links.

7 0
3 years ago
How ict tools changed the way we live explain it​
laiz [17]

Answer:

How does ICT change our way of living?

ICT has contributed a lot to change our everyday life such as letter to e-mail, market shopping to on-line shopping, classroom learning to e-learning, etc. This paper present's the effects of ICT as Home and Domestic Activities, Social Networking, Education, Health, Commerce, Banking, and Employment.

5 0
2 years ago
Other questions:
  • Binary search requires that data to search be in order. true or false
    5·1 answer
  • While traveling in India, Sabina notes all of her daily expenses in rupees in her spreadsheet. At the end of the day, she wants
    5·2 answers
  • Which of the following statements is the least abstraction of the world wide web?
    6·2 answers
  • Tablets combine the features of which two types of devices?
    10·2 answers
  • Python
    14·1 answer
  • Given main() and a base Book class, define a derived class called Encyclopedia. Within the derived Encyclopedia class, define a
    10·1 answer
  • A pre-design document you can use to create a new project quickly
    5·1 answer
  • LaToya is creating a program that will teach young children to type. What keyword should be used to create a loop that will prin
    9·1 answer
  • Could anyone help me with this assignment please?
    6·1 answer
  • What are the benefits and drawbacks of a desktop utilising virtualisation and a server?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!