1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shkiper50 [21]
3 years ago
6

A(n) _____ is a type of server that stores computer software, which users can access from their workstations.

Computers and Technology
1 answer:
Olenka [21]3 years ago
6 0

Answer:

Application server

Explanation:

In networking, services are used in networks to provides centralized services which is needed by all the devices in the network. It reduces the time and effort, needed by a network administrator to configure these services on different workstations.

There are various types of servers, they TFTP, DHCP, DNS, FTP, Web servers etc. There are also categories of server ranging from Web servers to file servers and then application server.

Application servers stores computer softwares (even computer operating system ), for users to access from their workstations.

You might be interested in
Suppose that the splits at every level of quicksort are in the proportion 1 − α to α where 0 < α ≤ 1/2 is a constant. Show th
Lady_Fox [76]

Answer:

Explanation:

The minimum depth occurs for the path that always takes the smaller portion of the

split, i.e., the nodes that takes α proportion of work from the parent node. The first

node in the path(after the root) gets α proportion of the work(the size of data

processed by this node is αn), the second one get (2)

so on. The recursion bottoms

out when the size of data becomes 1. Assume the recursion ends at level h, we have

(ℎ) = 1

h = log 1/ = lg(1/)/ lg = − lg / lg

Maximum depth m is similar with minimum depth

(1 − )() = 1

m = log1− 1/ = lg(1/)/ lg(1 − ) = − lg / lg(1 − )

4 0
3 years ago
Explain how any simple substitution cipher that involves a permutation of the alphabet can be thought of as a special case of th
Kaylis [27]

A simple substitution cipher takes each vector (e_i) and assigns it to the vectors [e_{\pi (i)}] in a one-to-one function so as to make them equivalent.

<h3>What is the Hill cipher?</h3>

In 1929, the Hill cipher was invented by Lester S. Hill and it can be described as a poly-graphic substitution cipher that is typically based on linear algebra and it avails a cryptographer an ability to simultaneously operate on more than three (3) symbols.

In Cryptography, the simple substitution cipher is usually viewed as a function which takes each plaintext letter (alphabet) and assigns it to a ciphertext letter. Thus, it takes each vector (e_i) and assigns it to the vectors [e_{\pi (i)}] in a one-to-one function so as to make them equivalent.

Read more on Hill cipher here: brainly.com/question/13155546

#SPJ1

6 0
2 years ago
a _____ is a recreation of a thumbnail in a desktop publishing software, also known as a "rough". a. proof b. digital draft c. l
Dmitrij [34]
D. It’s a sketch. That is, if you talking about, an art piece.
6 0
3 years ago
Ocial need, social resources, and a sympathetic social context are the three points of
Ostrovityanka [42]
The correct answer to the question is Option D (<span>social involvement in technology innovation). It has been said that there are three points at which there must be some social involvement in </span><span>technological innovation:
1. So</span><span>cial need
2. Social resources
3. A sympathetic social ethos

If there is a default in any of these three factors, it is unlikely that a </span>technological innovation will be widely adopted or successful.
8 0
3 years ago
A ____ in Excel is like a notebook.
laila [671]
A workbook in Excel is like a notebook.
3 0
3 years ago
Other questions:
  • Which of these graphic elements combine text, illustrations, and color?
    14·2 answers
  • What financial behaviors will typically lead to a low credit score?
    14·1 answer
  • Which is better? iPhone 11 Pro Max or Samsung Galaxy Note 20 Ultra 5G and why?
    12·2 answers
  • When light does not pass through or bounce off an object, it is said to be
    13·2 answers
  • Question #4
    8·1 answer
  • Design the following webpage using suitable html code .
    11·2 answers
  • Where is the element coded in a web page.
    13·1 answer
  • Is Invader Zim gonna come back?
    7·1 answer
  • Many large companies use the word(s), _____, to refer to the huge network of computers that meets their diverse computing needs.
    12·1 answer
  • Complete the following sentences using each of the words provided ONCE only. KEYBOARD DESKTOP STORE PRINTER COMPUTER MOUSE MONIT
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!