1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BigorU [14]
3 years ago
15

In a peer-to-peer network, every computer can communicate directly with every other computer. In addition, every computer is cap

able of sending and receiving information to and from every other computer. What security concerns do you have about this type of network
Computers and Technology
1 answer:
KonstantinChe [14]3 years ago
6 0

There are lot of computer network. The security concerns do you have about this type of network is that;

  • They are not really secure this is because in simple installations, data and other resources are shared by network users and this can be easily seen and used by individuals who have not been authorized.

<h3>Peer-to-Peer Network </h3>
  • This is known as a type of network where every computer are able to communicate directly with every other computer.

All computer on this network has equal. but, each computer are configured to share only some of its resources. It is known for its security risk of data been not safe in this network.

Learn more about network from

brainly.com/question/1172049

You might be interested in
IDENTIFYING VERBS THAT AGREE IN NUMBER WITH THEIR SUBJECTS For each of the following sentences, write the correct form of the ve
Novay_Z [31]

Hey there!

  • The word "<u>verb</u>" simply means <em>'description of an action, assert, or event that is made into the main purpose of your predicate in your judgement' </em>
  • Now that we have the definition of the word verb we can answer your question
  • "<em>Has</em>" is past tense but it is THIRD person present
  • "<em>Have</em>" is when you own something
<h2>Answer: HAS ✅</h2>

BECAUSE "I SAW last night"

Note: usually people read the sentence to themselves until it makes easier sense to them or use context clues in the sentence to answer the particular question(s)

Good luck on your assignment and enjoy your day!

~LoveYourselfFirst:)

6 0
3 years ago
Read 2 more answers
Bytes are arrangements of
tigry1 [53]
The answer is B. Eight bits
7 0
3 years ago
¿Que es una linea del tiempo?
DanielleElmas [232]
Una línea donde vas ordenando los hechos que han sucedido hasta el presente, aquí te dejo un ejemplo

•___________________________•
P. N. E. HISTORIA
A. E. D
L. O. M
E. L
O. I
L. T
I. I
T. C
I. O
C
I
6 0
3 years ago
Of the following, the greatest advantage of a database architecture is that
Zina [86]

Answer:

c.

Explanation:

Of the following, the greatest advantage of a database architecture is that data redundancy can be reduced. This refers to data being unintentionally repeated within the database causing space to be taken up unnecessarily. Database architecture allows for this problem to be addressed and prevented.

3 0
3 years ago
A client sends seven equal sized segments with sequence numbers 15, 25, 35,45, 55, 65, and 75. Segments with sequence numbers 35
ikadub [295]

Answer: I believe the answer is 6

Explanation: taking 35 and 65 out leaves the rest of the numbers; 15,25,45,55, and 75.

3 0
4 years ago
Other questions:
  • What should the timing of transition slides be per minute?
    9·2 answers
  • What is one visual indication that a usb port can be used to charge a mobile device?
    13·1 answer
  • Write a Python program that gets a single character from the user and writes out a congratulatory message if the character is a
    9·1 answer
  • How to delete account on this
    7·2 answers
  • What is the target audience for this poster?
    5·2 answers
  • The measure of how quickly things may be converted to something of value is called.
    10·2 answers
  • _________________________ are people, places, and materials, either printed or non-printed, that can provide answers to inquirie
    8·1 answer
  • Select the correct answer.
    15·1 answer
  • Public class Bird
    6·1 answer
  • _________ can be used to provide access control, confidentiality, data origin authentication, connectionless integrity, rejectio
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!