1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BigorU [14]
2 years ago
15

In a peer-to-peer network, every computer can communicate directly with every other computer. In addition, every computer is cap

able of sending and receiving information to and from every other computer. What security concerns do you have about this type of network
Computers and Technology
1 answer:
KonstantinChe [14]2 years ago
6 0

There are lot of computer network. The security concerns do you have about this type of network is that;

  • They are not really secure this is because in simple installations, data and other resources are shared by network users and this can be easily seen and used by individuals who have not been authorized.

<h3>Peer-to-Peer Network </h3>
  • This is known as a type of network where every computer are able to communicate directly with every other computer.

All computer on this network has equal. but, each computer are configured to share only some of its resources. It is known for its security risk of data been not safe in this network.

Learn more about network from

brainly.com/question/1172049

You might be interested in
John travels a lot and he needs to access his documents and services on the go. Which of these technologies allows his to access
kirza4 [7]

<u>Answer:</u>

<u>Cloud computing</u><em> allow the user to access software or any document from the remote place.</em>

<u>Explanation:</u>

Let us understand what does the word cloud actually means. In simple terms, we get rain from cloud, but we don’t know actually which cloud burst to give rain.

In a similar way, <em>the cloud computing is the concept of storing files in multiple servers and multiple location</em> and it provide access when the <em>client needs the source. </em>

Cloud computing enable user to work on <em>software online</em> or to download document or <em>edit / create documents online</em>. Certain services are <em>free and few other are paid.</em>

6 0
3 years ago
To lose weight, you must _______.
sweet [91]

Answer:

B

Explanation:

because you need to exercise and eat or drink less calories

8 0
2 years ago
Read 2 more answers
Which key(s) will launch the Spelling Checker dialog box? F8 F7 Ctrl+H F2
KIM [24]

Answer:

F7

Explanation:

Mostly in MS Office products, although a lot of other products will mimic the same well known key sequences as a way of enticing you to their platform.

6 0
2 years ago
Read 2 more answers
1 what elements of composition are under your control in photoshop
inn [45]
Tone
Sharpness
Scale
Arrangement
7 0
3 years ago
How to play Drinkopoly game?
professor190 [17]
Answer:
Never heard of that lol
3 0
2 years ago
Other questions:
  • Write an exception class named InvalidTestScore. Modify the TestScores class you wrote in Part I so that it throws an InvalidTes
    10·1 answer
  • What is a color that cannot be created by mixing other colors together?
    15·2 answers
  • Which one of the following rules for selecting a password is the best?
    5·2 answers
  • 60 POINTS IF YOU GET IT RIGHT
    6·2 answers
  • 5. In what ways is the human brain like a computer? In what ways is it different?
    15·2 answers
  • What does this function do in the code?
    5·2 answers
  • What is the main difference between weathering, erosion and leaching​
    9·1 answer
  • What is the outcome when a floating-point number is divided by zero?
    12·1 answer
  • Which of the following is a primary disadvantage of using a GUI HTML editor to develop your Webpages?
    10·1 answer
  • Which code snippet is the correct way to rewrite this in Semantic HTML?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!