Which of the following is not one of the disadvantages of peer-to-peer networks?
a. They lack scalability.
b. They are not necessarily secure.
c. They are impractical for connecting large numbers of computers.
d. They centralize user account logins.
ANSWER: d
You might also like to view...
Before heading to a meeting, you may want a(n) ____ of contacts for reference.
A. file B. contact list C. email address D. printed list
Case-Based Critical Thinking QuestionsCase 22-1Ethan is in charge of Internet security for a small company. Employees are often asking him questions related to their identity and privacy online, as well as about some phishing schemes. Below are three of these questions. How can I protect my privacy online?
A. Promptly reply to spammers. B. Do not use social networks like Facebook to share information about your family. C. Use your real name when participating in chat rooms. D. Assume that all emails are like sealed letters.
Graphic symbol instances display their animation when you scrub the ____________________ in the document's main Timeline or play the animation within the Stage window of the main Timeline's animation.
Fill in the blank(s) with the appropriate word(s).
All of the following are tabs in the Folder Options dialog box EXCEPT:
A) Browse folders B) Tasks C) General D) Default