1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BigorU [14]
3 years ago
15

In a peer-to-peer network, every computer can communicate directly with every other computer. In addition, every computer is cap

able of sending and receiving information to and from every other computer. What security concerns do you have about this type of network
Computers and Technology
1 answer:
KonstantinChe [14]3 years ago
6 0

There are lot of computer network. The security concerns do you have about this type of network is that;

  • They are not really secure this is because in simple installations, data and other resources are shared by network users and this can be easily seen and used by individuals who have not been authorized.

<h3>Peer-to-Peer Network </h3>
  • This is known as a type of network where every computer are able to communicate directly with every other computer.

All computer on this network has equal. but, each computer are configured to share only some of its resources. It is known for its security risk of data been not safe in this network.

Learn more about network from

brainly.com/question/1172049

You might be interested in
in the client server model, what is the primary protocol used for communication between a browser and Web server
worty [1.4K]
Assuming the client is using a web browser, your answer would most likely be the Hyper-Text Transfer Protocol (HTTP).

HTTP is a very, very common way of transfering insensitive data from client to server. HTTPS is more secure, adding a secure socket layer to protect communications from being intercepted.

--

As an alternative answer, the FTP (File Transfer Protocol) may be an acceptable answer, but this is usually not the primary method of communication for clients, as it is mainly used to access and modify files on the server, requiring a username-password combo to do so (usually).


7 0
3 years ago
The words, the computer is the future, has how many bits?
Nadusha1986 [10]

The words, the computer is the future, has 64 bits.Modern computer has

two types of processors which include:

  • 32 bit
  • 64 bit
<h3>Bits</h3>

This is referred to as the smallest unit of data which is used in a computer.

The 32 bit computer are the old types which have a smaller processor and is

relatively slow.

The 64 bit computer on the other hand are the modern types with large

processors and are relatively fast.

Read more about Computer here brainly.com/question/13380788

4 0
2 years ago
The requirement, "The system shall receive information quickly," is an example of a functional requirement.
olga55 [171]

Answer: False

Explanation: Functional requirement is the requirement in the operating system that gives the description of the functioning and specific action that is done by system.

Thus, receiving the data rapidly is not the form of functional requirement as it does not specifies any function that is to be done and receiving of data is already being done and at faster rate in future.

Performance requirement is the factor that is required for defining that how well a system should perform the function.So, reviving data at rapid rate is performance requirement.So, the statement given is false.

6 0
4 years ago
Which of these is a biotic factor in a forest?
Masteriza [31]
Climate because it is
7 0
3 years ago
If you fail a course as a MAIN (residency) course, you can repeat that course as either a MAIN (residency) or an online (IG or I
Elina [12.6K]

Answer: False

Explanation:

The statement that "you fail a course as a MAIN (residency) course, you can repeat that course as either a MAIN (residency) or an online (IG or IIG) course" is false.

It should be noted that if one fail a course as a residency course, the course can only be repeated as a main (residency) course and not an online course. When a course is failed, such course has to be repeated the following semester and this will give the person the chance to improve their GPA.

5 0
3 years ago
Other questions:
  • Which type of attack is one in which a rogue wireless access point poses as a legitimate wireless service provider to intercept
    10·1 answer
  • Explain how you give users keyboard access to a text box
    6·1 answer
  • What is basic statement made up of​
    10·2 answers
  • How do say phone in French?
    10·2 answers
  • ____________ is/are the information, knowledge of people or things, and connections that help individuals enter preexisting netw
    13·1 answer
  • What cell phone technology is the most popular in the united states?
    8·2 answers
  • Because collecting the adjustment data requires time, the adjusting entries are often a.estimated and recorded earlier than the
    8·2 answers
  • Which device do engineers use to drive a system of gears?
    15·2 answers
  • Mention some of the codes of conduct of Information Technology (IT)​
    11·1 answer
  • List out the input and output device .​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!