A university wants to install a client-server network. Which feature do you think is important for them as they set up the network?

sending email
blocking multiple people to use the same file
low security
low set up cost
limited access to files

Answers

Answer 1

Answer: low security

Explanation:

While internet is a platform to share information and use various network over to internet for communication, the security of the network is a big issue these days. Since the university wants to install a client-server network.

It has to take care of the low-security issue as the data with which they will be dealing is a very sensitive data which includes information of students and their families, upcoming policies, financial transaction. Hence the university should no compromise on low security.

Answer 2

Answer:

Low security =3

Explanation:


Related Questions

Flinstonia has a real GDP of $100,000, and Bedrockton has a real GDP of $100,000,000. Which country has the higher standard of living?

Answers

Bedrockton because the higher the GDP the higher the living standard.

What are the most important advantages of using the insert chart tool in word and importing data from Microsoft excel

Answers

I am not sure but I think that it is the third answer

What is the mathematical order of operations used in Excel when formulas are evaluated?

Answers

This order of operations states the order to be. A. exponentiation, multiplication and division, addition and subtraction.

Which law requires employers to provide safe working environments for their employees? A. Civil Rights Act B. Fair Labor Standards Act C. Occupational Safety and Health Act D. Wagner Act

Answers

Answer:

C. Occupational Safety and Health Act (OSHA).

Explanation:

This law requires employers to provide safe and healthy working conditions for their employees.

Enter a formula or in sales G5 the calculate the difference between the attendance totals for 2018 and 2017

Answers

we will write year in column B and column c respectively

2017 and 2018

then we will add months of year from January to December in the cells range from A2 to A13

then we will choose cell g5 and will write the diffrence formula

g5=attendance of 2018 - attendance of 2017"

we put "=" sign to put an formula in excel

then finally we will use fill handle and drag it from g6 to g12

to copy the difference  formula

look at attached file

Students can use eNotes to type notes directly on screen and
A. review or print them later.
B. post visual cues on their desktop.
C. clip text and images from websites.
D. store information to a back-up system.

Answers

Answer:

a i think sorry if im wrong

Explanation:

Students can use eNotes to type notes directly on screen and store information to a back-up system.

What is Enotes?

Brad Satoris and Alexander Bloomingdale created the free educational website eNotes in 1998. It offers resources to aid students in completing their homework assignments and preparing for tests. eNotes is a Seattle, Washington-based company that focuses on providing lesson plans, study materials, and literary analyses.

Although the business offers a wide range of topics in the humanities, the website's content primarily focuses on literature and history. The majority of the content is contributed by a network of more than 1,000 professors and teachers.

It differs from other paid online education providers in that uploaded works are primarily edited by an internal publishing team.

Therefore, Students can use eNotes to type notes directly on screen and store information to a back-up system.

To learn more about Enotes, refer to the link:

https://brainly.com/question/2114707

#SPJ3

What is the outcome when you select a section of unformatted text and click the Bold option, then the Italic option, then the Underline option? A. The resulting section of text will remain unchanged because this works only for individual words. B. The resulting section of text will only have the last formatting (underline). C. The resulting section of text will be bold, italic, and underlined. D. The resulting section of text will remain unformatted because you cannot use more than one formatting style. E. The resulting section of text will be bold and the program will ignore all other styling after that. Reset Next

Answers

I believe the answer is C

Answer:

c

Explanation:

what is scratch in information system .

Answers

Scratch is a visual programming dialect and online network focused on essentially at youngsters, by coding with squares in the manager. Clients of the webpage can make online undertakings utilizing a square like interface. Scratch is a genuine programming  language in its own right. Scratch is written in squeak, an open source execution of smalltalk-80 dialect.

What happens if too many elements within the photograph demand equal attention

Answers

The hierarchical development consists of a dominant and subordinate visual elements and no visual element is insignificant; each and every one contributes to communication of the message and it depends on complementing and contrasting of visual elements. If the design has a clear focal point which initiates viewers interaction with the design and then clear subordinate elements to support the focal point–the design maintains fixed attention of the eye. But if all visual elements demand equal attention, the eye is destructed and wonders around the page without any direction.
Hierarchy begins by rating visual elements by importance: what needs to be seen first, second, third, etc. Dominant elements will reside in a foreground while subordinate elements will activate the background in support of dominant elements.
Examples:

Give three reasons why Black hats hack?

Answers

this one makes no since to me sorry.

Answer:

Explanation:

In bo2 they can hack scorestreaks!

How many 4 GB movies could you store on a 500 GB hard drive?

Answers

125 movies and maybe some kb sized movies (depends on the amount of kb)

in order to figure this out you must divide the amount of space by the space a single movie take. This will give you the amount of movies you could have. 500/4=125. therefore you could have 125 movies

Which statements are true about satellite internet access

Answers

Answer:

it is cheap it is the slowest internet access technology it can be used in rural and remote areas. it requires direct line-of-sight to work it requires major installation of new infrastructure. it covers a large geographical area. reset next - Soetrust

what are the two reasons you might decide to flash bios

Answers

Two reasons you might decide to flash BIOS are:

-The system hangs at odd times or during the boot.  

-Some motherboard functions have stopped working or are giving problems. For example, the onboard video port is not working.

Can someone please check if I’m correct? Code is in Java

Answers

You are right. Option 1 would give 11 iterations.

What of the following can a cell contain? A number a word a function of these

Answers

A function of these

A/an is a mathematical state that calculates a value

Answers

A formula is a mathematical state that calculates a value.

It is a special equation that shows the relationship between various variables. It is used to express mathematical relationships and rules, symbolically and concisely, and offers a solution to a problem. An example of a formula is one that expresses the volume of a box or the circumference of a circle.

What are at least three tips to taking photographs of insects? Why would following the tips help create better photographs?

Answers

1) Use a good cam 2) Make sure you focus on it 3) Make sure you snap it at the right time....    I hope this helps!!!!!

Match each malware type to its description

Answers

1. Trojan Horse

2. Worm

3. Virus

The infection of files by malicious programs, software and files could take different forms. The expressions given represents programs capable of damaging computer files.

Trojan horse WormVirus

Trojan horse are described as programs which are appears to be innocuous or harmless. Hence, using these medium to penetrate into our computer files.

Worms describes malwares which are capable of splitting from one single or independent malware so theu could spread through a network of computers.

Viruses creeps into a computer when they become attached to a file or program. This infecting computers upon the installation or download of such file.

Therefore, all stated programs causes damage to computer and file system.

Learn more :https://brainly.com/question/2203272

In what two ways can you measure hard drive speed? Explain each of these measurements.

Answers

u can measure it in GB, MB, and TB. which is mainly in measuring it by storage

Tina is making a resume for the first time. What should her heading section include?
A. Her skill set B. Her name and contact information C. Her career objectives D. The word “Résumé”

Answers

Name and contact information

An automated search feature used by search engines to find that match your search terms is called a spider or

Answers

Answer

Crawler

Explanation

This is a program that go to various website to read their pages and content provided in order to form entries for a search engine index.All search engines have this program called spider or a bot. It acts as an automated script that browses through the internet to scan the web pages and find words contained in the pages and where the words are used.


crawler is the term used to set a server in motion to do a search.

15 points


Based on what happens in Alice's Adventures in Wonderland, which word best describes the author's attitude toward Alice?

Answers

The author is sympathetic towards Alice in Alice's Adventures in Wonderland.

A word that best describes the author's attitude toward Alice is sympathetic. Hope I could help! :D

Which of the following likely has the highest degr



A. A biomedical researcher




B. A social worker




C. A registered nurse




D. A cosmetologist

Answers

the following likely has the highest degr is A registered nurse

So your answer is C. A registered nurse


Answer:

your answer is A

Explanation:

Im a 99% sure

How do they make the "chips" in computers?

Answers

This is done using an optical process, not unlike how old photos were printed. A silicon wafer is covered with some etching resisting material, and then exposed to UV light through a mask. The mask is a drawing of the chip schematic.

The etching resisting material is removed where the light hits (or vice versa), and parts of the silicon wafer is etched away with a chemical. Different layers can be deposited by repeating this process.

Finally the wafer is cut into little rectangles and placed inside a housing.

How does modularity provide flexibility in a structured programming design?

Modularity enables multiple programmers to work on a program at the same time
Modularity enables a linear approach to software development
Modularity ensures the reuse of code variables.
Modularity ensures that a program will be completed on time.

Answers

Modular programming is the process of subdividing a computer program into separate sub-programs. Modularity provides flexibility in a structured programming design the following way: Modularity enables multiple programmers to work on a program at the same time. Correct answer: A

It provides developers flexibility in module maintenance.This makes the program easier to read and understand.

Answer:

A

Explanation:

Got it right on Edge 2021

How can hackers obtain a person’s data? Malicious hackers can obtain a person’s data through the method of simple___ engineering.

Answers

The answer might be social

Answer:

simple social engineering

Explanation:

social engineering as regards to information security and not social science. is the act of deceiving people into performing/practicing unconventional activities on the information network that will get their personal data exposed.

This psychological manipulation of people on the network into performing unconventional activities that will get their personal data exposed is mostly performed by hackers. the aim of this is to perform fraudulent or malicious activities using their personal data either on them or on unsuspecting individuals.

A hacker is someone who tries to break in a computers defense system by exploring ways around it instead of seeking permission to have access into the system.

Technicans A says the engine camshaft converts reciprocating motion of the piston into rotary montion for power output. Technician B disagrees and says the crankshaft performs this function who is right?

Answers

It doesn't say what Technician B thinks, but I can tell you what the camshaft does and then you can decide who is right on your own. The camshaft is little metal rounded triangles above the piston that times when the intake and exhaust valve open and close.

Technician A is very wrong, the camshaft doesn't do that.

Final answer:

In a four-stroke internal combustion gasoline engine, both the crankshaft and camshaft play important roles in converting the reciprocating motion of the piston into rotary motion for power output.

Explanation:

In a four-stroke internal combustion gasoline engine, both the engine's crankshaft and camshaft play important roles in converting the reciprocating motion of the piston into rotary motion for power output.

The crankshaft converts the up-and-down motion of the piston into a rotating motion, which is then used to transfer power to the wheels of a vehicle or other devices.

The camshaft is responsible for opening and closing the engine's valves at the correct times, allowing for the intake of fuel-air mixture and the exhaust of combustion byproducts.

By what year had improvements in technology vastly improved the ability to stream videos online ? 1996 2006 2000 2012

Answers

2006

the year 2006 had the ability to lower costs and improve efficiency,


Final answer:

Improvements in technology drastically improved the ability to stream videos online in 2006.

Explanation:

The year that improvements in technology vastly improved the ability to stream videos online was 2006. Prior to this year, there were limitations in bandwidth and internet connections, making it difficult to stream videos smoothly. However, with advancements in broadband internet and video compression techniques, streaming video became more accessible and widespread.

Learn more about Improvement in technology for video streaming here:

https://brainly.com/question/34531430

#SPJ2

__________ has the highest conviction rate of any vehicle-related offense.

A. Changing lanes without signaling

B. Failure to stop at a red light

C. Speeding

D. Parking at a red curb

Answers

Answer:

Speeding

Explanation:

Excessive speeding has the highest conviction rate of any vehicle-related offense. It is often said that "speed thrills but kills." This statement is true. A cautious driver should always check for speed signs and always play by the rules. Speeding will not only get you a ticket but also will cause fatal accidents or collisions that might lead to injury or death. Speeding offenses include fines, points reduction, or court hearing.

Suppose there is a class Alarm. Alarm has two class variables, code which contains a String value representing the code that deactivates the alarm, and armed which contains a boolean describing whether or not the alarm is activated. Alarm has a function changeCode that takes two parameters containing Strings, the first representing the current code, and the second representing the new code. If the user inputs the current code correctly, the value of code is changed to that of the new code. Call the changeCode function on the Alarm object myAlarm, whose current code is "3456", and change the code to "7921".

Answers

it would be

myAlarm.changeCode("3456", "7921");


To change the code of the Alarm class, use the changeCode method by passing the correct current code and the new desired code.

For the instance myAlarm with the current code '3456', call myAlarm.changeCode('3456', '7921') to change the code to '7921'.

In programming, variables are placeholders in memory that can change their values. Here, we have a class Alarm with class variables code (a String) and armed (a boolean).

The changeCode method allows the code to be updated if the current code is inputted correctly. Assuming you have an instance of Alarm called myAlarm and its current code is "3456", you can change it to "7921" as follows:

class Alarm:
   code = "3456"
   armed = True

   def changeCode(self, current_code, new_code):
       if current_code == self.code:
           self.code = new_code

myAlarm = Alarm()
myAlarm.changeCode("3456", "7921")

After running this code, myAlarm.code will now be "7921".

Other Questions
Long division (4b^3+10b^2-32b+15) divided by (4b-6) where do you think evaporation would occur, the tropics or the subtropics? What are male gametes called?A.eggsB.embryosC.hormonesD.sperm What idiomatic phrase is used to describe where a general object is located?estil y aetdroite 6+4=4+6 is an example of which propertycommunicative property of additionassociative property of additionassociative property of multiplicationcommunicative property of multiplication Roger has two golden retrievers, sadie and buddy, buddy weighs 14 pounds more than sadie, if their total wight is 136 pounds, how much does sadie weigh ABpasses throughA(-3, 0) andB(-6, 5).What is the equation of the line that passes through the origin and is parallel to AB?A.5x 3y= 0B.-x+ 3y= 0C.-5x 3y= 0D.3x+ 5y= 0E.-3x+ 5y= 0 Graph each system. Tell whether the system has no solution, one solution, or infinitely many solutions.y = 2x 5y + 5 = 2x Willis drove 239.82 miles in 4.2 hours at a constant speed. How long would it take him to drive 445.38 miles at the same speed? What is the value of (-3+3i)+(-2+3i) An electric filter purifies air at the rate of 35 liters per minute and uses energy at the rate of 0.8 Joules per minute. It also purifies water at the rate of 25 liters per minute and uses energy at the rate of 1.3 Joules per minute. The filter is expected to purify more than 1000 liters of air and water while using less than 170 Joules of energy. Let A denote the number of minutes it spends purifying air and W the number of minutes it spends purifying water. Can someone help me on #18 !? Write the nuclear equation for a reaction important in thermonuclear weapons, ignoring the green numbers. Escoge la conjugacin correcta de verbo. Mi hermano ___ mucha tarea anoche. A. Haco B. hizo C. Hici D. Haci According to the AAS corollary, which of the following sets of relationships can be used to show that VRT and STR are congruent? A.STR VRT and VR ST B. TVR SRT and VTR RTS C. SRT VTR and VT SR D. RST TVR and STR VRT Help me on number problem 5 please he novel Uncle Toms Cabin helped: A.Southerners decide to secede from the Union. B.Northerners decide to support abolition. C.Northerners decide to support slavery. D.Southerners decide to support the Emancipation Proclamation. The specifications for a new cardboard container require that the width for the container be 4 inches less than the length and the height be 1 inch less than twice the length.a. Write a polynomial function that models the volume of the container in terms of its length.b. Write an equation if the volume must be 2208 cubic inches.c. Find the dimensions of the new container. Help! Giving out brainiest! PLEASE HELP!!!!!!The curve on the left shows the height of a rat population in 2007. The curve on the right shows the population in 2010. What type of selective pressure was taking place in this population? Steam Workshop Downloader