1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VARVARA [1.3K]
3 years ago
8

A​ client-server application that requires nothing more than a browser is called​ ________.

Computers and Technology
2 answers:
Nesterboy [21]3 years ago
7 0

Answer:

It is called a thin-client application.

Explanation:

A thin client application runs from resources stored on a main or central server instead of a localized hard drive. This work by networking it to a server-based computing environment that contains most applications, sensitive data, and memory. Thin clients has made companies or establishments to give employees access to certain applications and functions.

Some advantages of thin client include:

i. It is protected from unauthorized access.

ii. Data cannot be copied or lost because it relly on the server.

iii.  Easy management and monitoring of the system due to centralized processing.

The major disadvantage to a thin client is that it depends totally on a network.

goblinko [34]3 years ago
3 0
Hello  <span>Tacobell5401</span>

 Answer: A​ client-server application that requires nothing more than a browser is called​  thin-client application


Hope this helps
-Chris
You might be interested in
What type of backlighting receives dc power directly from a motherboard and doesn't use an inverter?
LenaWriter [7]
The answwer to the type of hardware is led lighting it does not need a inverter
3 0
3 years ago
Debevec mentions using the technology he described to animate entire human bodies. Discuss why you think this is or is not a goo
snow_tiger [21]

Answer:

Debevec is using the light of his team because this and that and because it’s manipulated

Explanation:

8 0
3 years ago
A web page typically contains ________, which contains the formatting instructions for displaying the web page.
USPshnik [31]
HTML: Hypertext Markup Language. It's used in conjunction with CSS (Cascading Style Sheets), which implements presentation (adding color, positioning elements, etc.) and JavaScript (you'll often see this referred to as JS), which implements functionality (like clicking on buttons) for webpages.
3 0
3 years ago
Consider two different implementations, M1 and M2, of the same instruction set. There are three classes of instructions (A, B, a
Margaret [11]

Explanation:

A.)

we have two machines M1 and M2

cpi stands for clocks per instruction.

to get cpi for machine 1:

= we multiply frequencies with their corresponding M1 cycles and add everything up

50/100 x 1 = 0.5

20/100 x 2 = 0.4

30/100 x 3 = 0.9

CPI for M1 = 0.5 + 0.4 + 0.9 = 1.8

We find CPI for machine 2

we use the same formula we used for 1 above

50/100 x 2 = 1

20/100 x 3 = 0.6

30/100 x 4 = 1.2

CPI for m2 =  1 + 0.6 + 1.2 = 2.8

B.)

CPU execution time for m1 and m2

this is calculated by using the formula;

I * CPI/clock cycle time

execution time for A:

= I * 1.8/60X10⁶

= I x 30 nsec

execution time b:

I x 2.8/80x10⁶

= I x 35 nsec

6 0
3 years ago
Which of the following is the path to the zoom button? select one:
kupik [55]
The correct answer is a. (view tab | zoom group).
8 0
3 years ago
Read 2 more answers
Other questions:
  • In databases and database-related software, which choice is not a Boolean operator?
    7·2 answers
  • The ________ of the operating system enables users to communicate with the computer system. modem window network adapter card us
    14·1 answer
  • Corey is an architect. What software does he most likely use to design houses? graphic software scheduling software CAD software
    10·2 answers
  • When a hardware or software interrupt occurs, the CPU calls________
    14·1 answer
  • Type the correct answer in the box. In which phishing technique are URLs of the spoofed organization misspelled? _____ is a phis
    11·1 answer
  • Recall the problem of finding the number of inversions. As in the text, we are given a sequence of n numbers a1, . . . , an, whi
    8·1 answer
  • Why do TV shows/Movies from the 90's and early 2000s look so much different compared to today?
    7·1 answer
  • Write a program that reads from the user any three points in two dimensional space: x1, y1, x2, y2, x3, y3. Assume these points
    13·1 answer
  • If you are going to refer to a few dozen classes in your application, how do<br> you do it?
    6·1 answer
  • Most spyware programs are benign in that they do not perform malicious acts or steal data. group of answer choices true false
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!