1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kondaur [170]
3 years ago
15

A computer on a network that is not the server​

Computers and Technology
1 answer:
katrin [286]3 years ago
5 0

Answer:

A peer-to-peer network is one in which two or more PCs share files and access to devices such as printers without requiring a separate server computer or server software. ... A P2P network can be an ad hoc connection—a couple of computers connected via a Universal Serial Bus to transfer files.

You might be interested in
What is the purpose of heading tags?
Svetllana [295]
All of the above (A,B,C,D)
6 0
2 years ago
What is project management? A. Brainstorming ways to plan a project B. Executing, completing, and revising a project C. Managing
rosijanka [135]

The correct answer is D. Planning, executing, and completing a project

Explanation:

Project management is a discipline that deals with the development of projects, especially in businesses. This discipline focuses on the different stages of developing a project that includes planning, executing, and completing a project, as well as other elements related to the development of projects such as budget, objectives, or time. Thus, project management can be best defined as "Planning, executing, and completing a project."

7 0
3 years ago
Can include the 5-tuple information, which is the source and destination ip addresses, source and destination ports, protocols i
Delicious77 [7]

<span>The answer is Firewall Log.  The </span>Logging tab is a tabled, real-time and up-to-date integration of the traffic logs generated by the Firewall. It will show all the connections that have been active on your computer.  <span>You can also use the Windows Firewall log file to monitor TCP and UDP connections and packets that are blocked by the firewall.</span>

7 0
3 years ago
The processing power of a computing device is measured by its _____.
Scilla [17]

Answer:

china

Explanation:

8 0
3 years ago
Hey yall wanna send me some just ask for my phone #
GuDViN [60]

Answer:

Send you some what?

Explanation:

the answer is 12

7 0
3 years ago
Other questions:
  • Maintenance is an essential task that is often considered to be dull. In information security, penetration testing may be wrongl
    12·1 answer
  • Which connector is most commonly used to connect printers to desktop pc systems?
    10·1 answer
  • The one place where c++ allows aggregate operations on arrays is the input and output of c-strings.
    8·1 answer
  • MTTF is a file format developed by Microsoft commonly used on Windows systems; it offers file security, large volume size, large
    11·1 answer
  • If in your checkout cart right before you buy something there is an option saying "this order contains a gift." on amazon, what
    7·1 answer
  • What PowerShell command can be used to clean up old update files on a WSUS server, including unused update files, old revisions,
    10·1 answer
  • Consider the conditions and intentions behind the creation of the internet—that it was initially created as a tool for academics
    12·1 answer
  • 7 steps in infographic design​
    6·1 answer
  • The Table Design and Layout tabs are available under the
    13·2 answers
  • Mention any
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!