1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kaylis [27]
3 years ago
8

Briefly describe the client/server model.

Computers and Technology
1 answer:
Marina86 [1]3 years ago
6 0
The client-server model is network architecture in which each computer or process on the network is either a client or a server. The components are clients, servers and communication network. <span>1. Clients are applications that run on computers. It relies on servers for files, devices, processing power. </span> Example: Email Client Email Client is an application that enables you to send and receive e-mail <span>2. Servers are computers or processes that manage network resources:</span> Disk drives (file servers) Printers (print servers) Network traffic (network servers)  Example: Database Server is a computer system that processes database queries  <span>3. Communication Network is a networks connect clients and servers</span> <span> </span>
You might be interested in
Whats a computer scientist.
Kazeer [188]

Answer:

computer scientist is a person who has acquired the knowledge of computer science, the study of the theoretical foundations of information and computation and their application.

4 0
2 years ago
Read 2 more answers
How do you write a multiplication formula in excel with an absolute refrence?
White raven [17]
To multiply all the numbers in column A by cell C2, add $ symbols to the cell reference like this: $C$2, which you can see in the example below. Using $ symbols tells Excel that the reference to C2 is “absolute,” so when you copy the formula to another cell, the reference will always be to cell C2.
4 0
2 years ago
An additional factor in how an element is rendered is that properties are passed from a parent element to its children in a proc
belka [17]

Answer:

style inheritance

Explanation:

What happens when a property on an element has no value supplied is governed by style inheritance. A property should inherit its value from its parent element, according to this specification.

6 0
2 years ago
Complete the paragraph to explain how Angelina can notify readers that her report is just a draft.
iogann1982 [59]

Answer:

Background

Design

Page background

Custom

Explanation:

5 0
3 years ago
o maintain reasonable key security (mark all that apply): Ensure that someone else always has an extra key. Ensure that no extra
Komok [63]

Answer:

The answer is "second, third, and fourth choices"

Explanation:

In the question the numbering of the choices were missing if we numbering the choices so, the first choice will be one first number and second choice is in second and so on, and its explanation can be defined as follows:

The network safety key is a type of network login credentials or passwords which is used for provides authorization as well as access the network or device upon which client requests to communicate throughout the form of physical, digital, or biometrical information login.  

  • It doesn't ensure the extra key.  
  • It helps ensure there were no additional duplicates.  
  • It keeps strict access codes as well as keys command.  
  • It makes sure, that its key could not be linked to able to operate the lock.
6 0
2 years ago
Other questions:
  • "Simon Says" is a memory game where "Simon" outputs a sequence of 10 characters (R, G, B, Y) and the user must repeat the sequen
    12·1 answer
  • What is the term used for the document that describes the scenes and sequence of a game?
    6·1 answer
  • You would like to search for information about storms but not tornadoes. What type of search strategy may be useful?
    10·2 answers
  • Write the WordSandwich method allSandwiches. This method creates and returns a new array of String objects as follows. Each elem
    13·1 answer
  • if a second system failure occurs while the first recovery is in progress, what needs tobe done after the system recovers for th
    11·1 answer
  • R6. Suppose N people want to communicate with each of N - 1 other peo- ple using symmetric key encryption. All communication bet
    13·1 answer
  • Assume that you are asked to develop a C++ program that help an elementary school teacher to
    9·1 answer
  • Expectation on Information Technology Fundamental​
    12·1 answer
  • The famous arcade game Space Invaders was first adapted to which home console?
    14·1 answer
  • You would like to see only the last 15 lines of /home/user/log file on your linux machine. Which command line interface (cli) co
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!