1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleksandr-060686 [28]
2 years ago
15

Which type of network consists of multiple Windows computers that share information, but no computer on the network serves as an

authoritative source of user information
Computers and Technology
1 answer:
Alexxandr [17]2 years ago
7 0

The type of network that consists of multiple Windows computers that share information is peer-to-peer. In this network, the computer serves as an authoritative source of user information.

<h3>Peer-to-peer computer networks</h3>

A peer-to-peer (P2P) network can be defined as a type of network where the computer acts as a source of user information.

In P2P, a cluster of different computers are linked and they have the same permissions for processing data in the network.

This type of computer network (peer-to-peer computer network) has been created to serve and/or receive data.

Learn more about peer-to-peer computer networks here:

brainly.com/question/1172049

You might be interested in
When recording data on a multiple-disk storage system, should we fill a complete disk surface before starting on another surface
Cerrena [4.2K]

The user needs to complete the entire disk surface first before starting another surface.

Explanation:

When you are using a multiple disk storage system to write the data the disk automatically writes the disk based on the algorithm for better efficiency and availability of the disk space.

hence when you are recording a data on a multiple disk storage system, it is recommended to fill the complete disk surface initially before you start the another surface to record the data.

4 0
4 years ago
An organization’s IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
emmasim [6.3K]

Answer:

The correct answer is (a) Remove the affected servers from the network.

Explanation:

Solution:

Now, since the organisation top priority is more of  containment over eradication, an outbreak code that is hostile as an can be suppressed effectively by removing the web server completely from the over all network facilities or infrastructure.

Also, if the affected servers are not removed, it might affect the integrity, confidentiality of sensitive materials or documents which will be exposed to the outside world by the attacker.

4 0
3 years ago
Which IDEs support multiple high-level programming languages? Select all that apply.
nata0808 [166]

Answer:

eclipse, xcode, and visual studio

6 0
3 years ago
Read 2 more answers
Can I have some help?
Ad libitum [116K]
I believe its A as the image provided says plain message
6 0
2 years ago
Which code snippet calculates the sum of all the even elements in an array values? Group of answer choices int sum = 0; for (int
olganol [36]

Answer:

The second one:

int sum = 0; for (int i = 0; i < values.length; i++) { if ((values[i] % 2) == 0) { sum += values[i]; } }

5 0
3 years ago
Other questions:
  • While Angela is making modifications to Katie’s Word document, she would like to inform Katie of the reasoning for the change. W
    10·1 answer
  • Instructions:Type the correct answer in the box. Spell all words correctly.
    14·2 answers
  • A digital certificate system: Group of answer choices uses digital signatures to validate a user's identity. is used primarily b
    13·1 answer
  • Software is giving instructions so that text is displayed on the monitor. This software is an example of _____.
    7·2 answers
  • Which of the following refers to a collection of colors, fonts, and effects that can be
    6·1 answer
  • Which of the following scenarios is an example of irrelevant media?
    11·1 answer
  • Why, y did brainly just do that........or did it just happen to me
    12·2 answers
  • Write a program in qbasic to accept a character and check it is vowel or consonant​
    14·1 answer
  • Generalized goals are more likely to be achieved than specific goals. True or False
    7·1 answer
  • Do software engineers save millions of dollars in usa
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!