There are two different network models. One of them, a peer-to-peer network, also is referred to as a ____________ network.
Fill in the blank(s) with the appropriate word(s).
workgroup
Computer Science & Information Technology
You might also like to view...
Which country hosted the most malware on the web in 2009?
a. Peru b. Russia c. China d. United States
Computer Science & Information Technology
Give an example of the use of temporal separation for security in a computing environment.
What will be an ideal response?
Computer Science & Information Technology