1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naddik [55]
3 years ago
15

Molly needs to access a setting in microsoft windows group policy to change the type of a network to which a computer is attache

d. Which setting must molly change?.
Computers and Technology
1 answer:
creativ13 [48]3 years ago
5 0

A computer is made up of different network. The setting that molly must change is network type.

A computer network is known to be a group of computers that are linked to each other so as to help the computer to communicate with another computer and share their resources, data, and applications.

A computer network can be classified based on their sizes. A computer network is of four types. They are:

  • LAN(Local Area Network)

  • PAN(Personal Area Network)

  • MAN(Metropolitan Area Network)

  • WAN(Wide Area Network)

Learn more from

brainly.com/question/14200752

You might be interested in
What is the page table mainly for?
postnew [5]

Answer: See explanation

Explanation:

A page table is used for the tracking and the location of different pages of a task in memory. It helps in showing the mapping of locations between the physical addresses and the virtual addresses.

A page table stores also has the page table entries and this is where the frame numbers are stored as well as the operational status.

6 0
3 years ago
in a client server architecture what are the three propoerties of a client and three properties of a server
polet [3.4K]

The three properties of a client and three properties of a server are mentioned to take the initiative in communication, etc.

<h3>What is server architecture?</h3>

Server architecture is the basic design or blueprint from which a server is built and/or deployed.

Client: takes the initiative in communication, doesn't speak to other clients directly, and only has to be online while a procedure is being completed.

The server is always running, waits for communication to begin, and serves several clients at once.

Thus, the three properties of a client and three properties of a server are mentioned to take the initiative in communication, etc.

Learn more about the server architecture here:

brainly.com/question/15220127

#SPJ4

4 0
2 years ago
Which layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for delivering data between two
s2008m [1.1K]

Answer:

Network.

Explanation:

The Transmission Control Protocol/Internet Protocol (TCP/IP) model is a standard networking protocol which allows network devices such as routers, switches, and host computers to interconnect and communicate with one another over a network. The Transmission Control Protocol/Internet Protocol (TCP/IP) model comprises of four (4) layers and these includes;

I. Application layer.

II. Transport layer.

III. Internet layer.

IV. Network layer.

The network layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for delivering data between two nodes.

Basically, this layer known as network layer is the fourth layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model and it is typically responsible for the transmission of packets from one network device to another.

4 0
3 years ago
How do films use camera shots?
lorasvet [3.4K]
These advanced camera shots, or angles, are used in film to convey an effect or emotion rather than exemplify a sense of space. Before filming, cinematographers will write out their shot list in order to plan how each scene of their film should be shot
7 0
3 years ago
Read 2 more answers
What skill would be easiest to learn from a simulation video game?
garik1379 [7]

Answer:

D

Explanation:

the first three you would need hands-on practice to learn.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Most information security incidents will occur because of _________. Select one: a. Users who do not follow secure computing pra
    10·1 answer
  • Network id is 192.168.10.32/28. what would be the ip address, if you assign the last available ip address in the range
    14·2 answers
  • Additional rows and columns are inserted into a table by using the _____ tab
    7·2 answers
  • How to double print ona printer that doesnt allow t
    11·1 answer
  • Presentation guidelines state that slides should have no more than bullet points.
    9·2 answers
  • Consider the following two implementations of the same algorithm, each written in a different language.
    11·1 answer
  • When would an absolute cell reference be most helpful?
    12·2 answers
  • Write an if statement that that decreases the variable shelfLife by 4 if the variable outsideTemperature is greater than 90. Ass
    5·1 answer
  • What is the difference between Counter Controlled iterations and Sentinel Controlled iterations? What is the purpose of the incr
    8·1 answer
  • Language is PYTHON
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!