There are two different network models. One of them, a peer-to-peer network, also is referred to as a ____________ network.

Fill in the blank(s) with the appropriate word(s).

workgroup

Computer Science & Information Technology

You might also like to view...

Which country hosted the most malware on the web in 2009?

a. Peru b. Russia c. China d. United States

Computer Science & Information Technology

Give an example of the use of temporal separation for security in a computing environment.

What will be an ideal response?

Computer Science & Information Technology