Browser applications are​ thin-client applications that​ ________.

a. do not need to be encrypted

b. are processed using visualbasic and​ c++

c. use cobol as the standard language for​ user-side processing

d. depend on internal networks and not the internet to transmit data

e. need not be preinstalled on the​ users' computers

Answers

Answer 1

Answer:

a

Explanation:


Related Questions

Rachel typed two paragraphs and then realized she was in the wrong document. What steps should Rachel follow to quickly move the text to the correct document? A.) Highlight the two paragraphs, select the copy command, place the cursor in the new document, and select the paste command.
B.) Place the cursor in the new document, select the paste command, highlight the two paragraphs, and select the cut command.
C.) Click twice on the paragraph, press delete, place the cursor in the new document, and select the paste command.
D.) Highlight the two paragraphs, select the cut command, place the cursor in the new document, and select the paste command.

Answers

It would be A. I hope that this helps!
I would use "cut" instead of "copy" (answer D) because if I "copy" the text, it will still remain in the wrong document, but if I "cut" and "paste" then it will actually be removed from the wrong doc and put into the right one.

The cylinder head and engine block are completely sealed by a A. valve seal. B. head gasket. C. intake manifold. D. spark plug

Answers

The cylinder head and engine block are completely sealed by a head gasket.


Answer:

Head Gasket

Explanation:

I've taken test

Which of the following is a benefit, as well as a risk, associated with peer-to-peer networks?

A) Clients depend on a working main server to perform their jobs.

B) Individuals can easily add or remove devices from their network.

C) Requires an IT professional, but easy to add clients to server and give privileges.

D) Software is maintained on the server, allowing for easy access to upgrade programs for all users.

Answers

[ Answer ]

Individuals can easily add or remove devices from their network

[ Explanation ]

This is a benefit as well as a great risk. Being able to add or remove devices from a network can be beneficial but dangerous. You have control over other people's devices. Being able to do this can allow someone to get into your network and see things that they shouldn't be able to see. Removing a device from the network is also not very helpful in certain circumstances.

<> Arsenal <>

The option that represents both a benefit and a risk associated with peer-to-peer networks is:

B) Individuals can easily add or remove devices from their network.

A) The option "Clients depend on a working main server to perform their jobs" is incorrect as it describes a centralized client-server network architecture, not a peer-to-peer network. In a peer-to-peer network, individual devices can directly communicate with each other without relying on a central server for all operations.

B) The option "Individuals can easily add or remove devices from their network" is a correct benefit associated with peer-to-peer networks. Peer-to-peer networks allow for easy scalability and flexibility, enabling users to add or remove devices as needed without significant infrastructure changes.

C) The option "Requires an IT professional, but easy to add clients to server and give privileges" is incorrect as it suggests the involvement of a central server and privileges management, which are characteristics of client-server networks. Peer-to-peer networks typically do not require dedicated IT professionals and offer decentralized access and resource sharing.

D) The option "Software is maintained on the server, allowing for easy access to upgrade programs for all users" is incorrect as it pertains to a client-server model where software updates are centralized. In a peer-to-peer network, software updates and maintenance are typically managed individually on each device, without relying on a central server.

In summary, the correct benefit of peer-to-peer networks is the ease of adding or removing devices (option B), while none of the given options accurately describes the risks associated with peer-to-peer networks.

To learn more about the peer-to-peer network;

https://brainly.com/question/10571780

#SPJ2

Other Questions
Choose specific stories from homer's the iliad and the odyssey which a.preserved religious teachings (how to behave so the gods won't hurt you) b.taught moral principles (how to be good or avoid being bad) c.provide entertainment to keep our attention [tex] \frac{10(x - y) - 4(1 - x)}{3} = y[/tex][tex]7 + x - \frac{x - 3y}{4} = 2x - \frac{y + 5}{3} [/tex] An atom that loses an electron is called a/an ____________.A.bondB.anionC.valence electronD.cation some help would be good What is the sum or difference?a. 5x4 + 4x4 b. 12x5y 9x5y A.a. 9x4 b. 3x5y B.a. 20x16 b. 108x25y2 C.a. 9x8 b. 3x10y D.a. 9x16 b. 3x25y2 Other than using financial aid options offered to him what are some creative ways he can make ends meet PLEASE HELP (Screenshot) The confederation of states was unsuccessful because .A. it was too powerful B. it followed English law C. it was too limited in its powerD. it taxed the states too much Subtract 6 3/5-2 1/4. Simplify the answer and write as a mixed number At 5:00 P.M., Megan fully cooked a turkey. She left it to sit out on the counter to cool. At 8:00 P.M., she decided to prepare turkey sandwiches. What advice would you give Megan? A. make sandwiches and freeze the leftover turkey B. make sandwiches and refrigerate the leftover turkey C. reheat the turkey, and then make sandwiches D. eat within the hour because she had thoroughly cooked the turkey E. throw it away What best defines the war hawks? 11) Flowers grow rapidly. A flower is 60 inches tall. Tomorrow it will be 71 inches tall. The next day it will be 82 inches tall, and on the next day it will be 93 inches tall. Write a rule to represent the height of the flower as an arithmetic sequence. How tall will the plant be in 12 days? apple newest ipad pro has a storage option of up to 128gb (gigabytes). how many bytes of storage will it have? use a conversion factor, and provide your answer in standard form and scientific notation Read the sentence and write the time in numerals and using pm and am.Il est vingt et une heures trente. In a probability experiment, Karen flipped a coin 65 times. The coin landed on heads 36 times. What percentage of the coin flips resulted in tails? Round to the nearest percent. What are the verbs adjectives and abstract nouns in this passage Which of the following conventions did Egyptian artists use in tomb sculptures? What disease is caused by misshaped red blood cells that prevent oxygen from properly reaching other parts of the body? The selling price of an item is ?$ 440 440. It is marked down by 20?%, but this sale price is still marked up from the cost of ?$ 320 . Find the markup from cost to sale price. In Ghana the ______ controlled all the trade. Steam Workshop Downloader