Homegroup
Your best solution would probably be an Ethernet network. With data speeds of 100 gigabits per second, it should provide the speed you require. Whatever file-server you want to use to manage all the terminals - is entirely up to you !.
The advantages of a complete network are:Communication is very fast between any two computers.If any computer breaks down, then it affects only the communication between the connected computers.
• Ask the user what URL has been typed and what error message displays.
Just about anyone can access the Internet. As long as you have a computer and a subscription or wi-fi connection there should be no problem. In third world and dictated countries, that is an entirely different story.
Figure it out your selves If you are doing a National Diploma in IT then you should know this
To reduce or eliminate costs that can result when end users manipulate PC's and other network resources, or when unauthorized USERS ACCESS NETWORK RESOURCES
SSO (single sign on) allows a person to access all the resources they need after they have authenticated once.
Well, mapping a network drive can make it easier for you to access your network resources quickly and efficiently. It allows you to assign a drive letter to the network location, making it feel like a part of your computer. This can save you time and make it more convenient to work with your files and folders on the network.
Advantage everyone on the network should have access. The disadvantage is that if the network storage is not security protected anyone could gain access
Routers, Access Points, Printers... Every device you will need to access sooner or later...computer can stay with Dynamic IP's since they should show their name in network, but routers, access points, printers, while they may show its not guaranteed.
With regard to the TCP/IP Network Model, the network access Layer is the lowest logical layer in the model and provides specifications for how data (bits) should move over the network.
User accounts and groups are useful for determining who can access various resources on a network. There may be a large number of files and folders that certain individuals should be able to modify and which others should be able to read but not be allowed to change. Assigning permissions to individual users allows a network administrator to control who can read or modify certain files and folders. They can also be used to control access to other network resources, such as printers. Assigning individual permissions to large numbers of people where large numbers of network resources exist can be time consuming. This is where groups are useful. Rather than setting each individual's permissions for each network resource, the group is set permissions, then users are assigned as members of groups. In this way the group permissions can be modified as network resources change and users can be moved from one group to another (or be made members of multiple groups) which will save time and reduce mistakes.
access, distibution and core
the access, distribution, and core layers
MAC
Yes, you should be able to see them on your network.
console