1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Butoxors [25]
3 years ago
11

DRU is a small brokerage house that enables its clients to buy and sell stocks over the Internet, as well as place traditional o

rders by phone or Fax. DRU has just decided to install a new e-mail package. One vendor offering an SMTP-based two-tier client -server architecture. The second vendor is offering a Web-based e-mail architecture. DRU doesn't understand either one but thanks the Web-based one should be better because, in their words, "the Web is the future". (a) Briefly explain to DRU management, in layperson's terms, the difference between the two. (b) Outline the pros and cons of the two alternatives and (c)Recommend to DRU about which is better.
Computers and Technology
1 answer:
prisoha [69]3 years ago
4 0

Answer:

(A)The SMTP is a guideline that allows a client to send a message to the server in a network.

The web based mail is a type of interface whereby a correspondence occurs by applying the web explicit conventions or standards fro most of the time.

(B)The pros of an SMTP based two tie client server architecture are that, it has a free platform and a simple set up, also a detailed conversation between a client and a server.

The cons includes, having a blocked SMTP ports, and the slow execution of mass mail.

For the Web based the pros are, no blockages are found, email responses are very quick.

It's cons are, it has a complex kind of arrangement.

(C)What is recommended in this case for DRU is to use the SMTP based two tier client server architecture because, it is quicker, faster, secure and easy to fix.

Explanation:

Solution

(A)The Simple Mail Transfer Protocol (SMTP) is a standard in a which a customer sends messages over to the server in a network.

The sending of emails determines the manner of communication between the server and customer or client. this starts of with a TCP association with a particular port. the customer sends out different snippets of data, and then the server needs to have to look for the verification and email.

A web based email is a kind of interface where the correspondence occurs by making use of web -explicit conventions, for most of the time, the  HTTP will allow you to integrate capacities from assistance coming from outside into your application.

(B) (i)SMTP based two tier client server architecture:

The pros or advantages:

  • It is platform free and has a simple set up
  • A complete conversation or communication between the server and the client.

The cons or disadvantages:

  • A blocked SMTP ports
  • For a mass email it has a slow execution or implementation

(ii) For the web based the pros and cons is stated below:

The pros:

  • No blockage is found
  • Quick email response or transfer or movement.

Cons or disadvantages:

  • It has a complex or difficult arrangement
  • Complexity of any type increases or goes higher.

(C) What i will recommend for DRU will be the SMTP based two tier client server architecture due to the following reasons shown below:

  • It is quicker
  • It is faster
  • It is more secure/security
  • It does not require any high skill to use it;s service
  • It is easy to fix.

You might be interested in
What is the main characteristic of a Peer-to-Peer (P2P) network?
Setler [38]

Answer:

A peer-to-peer (p2p) network provides a scalable and fault-tolerant mechanism to locate nodes anywhere on a network without maintaining large amount of routing state. This allows for a variety of applications beyond simple file sharing, including in multicast systems, anonymous communications systems, and web caches.

Explanation:

Not hard at all ma'am.

6 0
3 years ago
A computer’s BIOS is defined as the
Dennis_Churaev [7]
Basic input/output system
5 0
3 years ago
Read 2 more answers
What are the methods of gilding<br><br>nonsense will be immediately reported. ​
Luden [163]
Methods of gilding include hand application and gluing, typically of gold leaf, chemical gilding, and electroplating, the last also called gold plating. Parcel-gilt (partial gil) objects are only gilded over part of their surfaces.
6 0
2 years ago
A small business has suffered from a cyber attack, what could be the resultant damage​
frutty [35]

Answer:

Cyber Attacks can damage small or big business. Different kinds of attacks will lead to the different losses. some of the most common attacks are

  • DOS Attack
  • Bruteforce Attack
  • DDOS Attack
  • XSS Attack
  • API Attack
  • Network Attacks
  • Identity and Token theft attack
  • Man in the middle attacks
  • Application Level Attacks

Each attack can impact different domain and different level of damages. The biggest damage can be loss of reputation and monetorial losses. It can eventually invite law suites and can make company go bankrupt.

Explanation:

Following damages can be seen with cyber attacks.

<u><em>Loss of Reputation : </em></u>Loss of reputation is the worst damage that any cyber attack can create. This will  result in the business losses and also result in irreversible damage to existing customer base and also it will spoil the market value.

<u><em>Loss of Corporate Information:</em></u> Attackers can use the corporate information which can consist of customers data, unwanted lawsuits and also company’s employees details. Data recovery may not be possible once the attacker has full corporate access.

<u><em>Loss of Identity: </em></u>Once the personal information is lost then Hackers can use personal information for impersonation, and identity theft. Identity theft is more dangerous as it is used for illegal activities.

Cyber-attacks can disrupt your business activities and it will include as below

<u><em>Loss of Data : </em></u> Successful cyber attack can damage the data and even can corrupt the data which will be of no use.

<u><em>Loss of Infrastructure :</em></u> Servers, computers, databases can be disrupted with a cyber-attack which can be irreversible and even be more disastrous as physical infrastructure is impacted.

<u><em>Extortion losses :</em></u> Attackers can threaten to disclose sensitive data and can intern ask for ransom payment.

<u><em>Lawsuits : </em></u>If the customer’s data is exposed or used for illegal business then it will invite huge lawsuits.

<u><em>Notification Policy :</em></u> If data is breached then it is also important to notify the effected users and the next remedy taken to resolve it.

<u><em>Loss of Business :</em></u> Cyber attacks can create business losses and also will eventually affect existing and new customers.

4 0
3 years ago
What are 6 subtopics on computer programming ?
lubasha [3.4K]

On the internet, I found

Research topics

Artificial Intelligence

Computing and Mathematics

Cybersecurity

Data Science and Machine Learning

Embedded Systems and IoT

Process Management

Hope this helped :T

3 0
3 years ago
Other questions:
  • loop Write a program to read a list of exam scores given as integer percentages in the range 0 to 100. Display the total number
    5·1 answer
  • A short-term job or work project that can be paid or unpaid and can lead to a full-time, paying position is called a(n) _____.
    5·2 answers
  • The posterior auditory stream terminates in the ________ and is involved in ________.
    12·1 answer
  • Is instant messaging a form of synchronous communication
    10·1 answer
  • Multiply 1101 and 0110 in binary.
    10·1 answer
  • Cryptcat is a Linux distribution that includes hundreds of security and hacking tools, including Nessus and Metasploit. It can p
    11·1 answer
  • Your team will write a function that reverses a C-string, to practice using pointers. You must use pointers and C-strings for th
    6·1 answer
  • Use the drop-down menus to complete the statements about message marking, categorizing, and flagging.
    13·2 answers
  • You looked at the methods used to determine database requirements. Now, research and find a database requirements template. Choo
    9·1 answer
  • How to send an email to multiple recipients individually outlook
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!