Businesses should use a ________ network in order to share resources

A) hybrid
B) client-server
C) ring
D) peer-to-peer

B

Computer Science & Information Technology

You might also like to view...

Kerberos uses the _______ encryption algorithm.

A. AES B. PKI C. DES D. TGS

Computer Science & Information Technology

What was John von Neumann’s contribution to computing?

What will be an ideal response?

Computer Science & Information Technology