1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
algol13
4 years ago
9

If I asked you to design a client server application that would work as a progressive slot machine (if you don't know what that

is look it up before proceeding) client server application...what three choices would you make for that, why? Is the design much different from the time synchronization server?

Computers and Technology
1 answer:
Reptile [31]4 years ago
7 0

Answer:

Explanation:

Iterative vs Concurrent:

An iterative server handles both the association demand and the exchange engaged with the call itself. Iterative servers are genuinely straightforward and are reasonable for exchanges that don't keep going long.

Be that as it may, if the exchange takes additional time, lines can develop rapidly, when Client A beginnings an exchange with the server, Client B can't make a call until A has wrapped up.

In this way, for extensive exchanges, an alternate kind of server is required — the simultaneous server, Here, Client A has just settled an association with the server, which has then made a youngster server procedure to deal with the exchange. This permits the server to process Client B's solicitation without trusting that An's exchange will finish. Beyond what one youngster server can be begun along these lines. TCP⁄IP gives a simultaneous server program called the IMS™ Listener.

Some idea on on time synchronization is Synchronization of Clocks: Software-Based Solutions

Techniques:

1.time stamps of real-time clocks

2.message passing

3. round-trip time (local measurement)

4.Cristian’s algorithm

5.Berkeley algorithm

6.Network time protocol (Internet)

A system time server isn't something numerous entrepreneurs consider, and timekeeping is generally not a need for organize executives. In any case, legitimate system time synchronization is a fundamental piece of checking a system and settling issues inside it.

You might be interested in
Which of the following statements are true regarding Zyvox? (Select ALL that apply.)
Alinara [238K]

Answer: A,C,E

Zyvox = linezolid

Explanation:

Zyvox posses an excellent Gram positive coverage, as well as MRSA and VRE. Zyvox is primarily cleaned by the liver, the MAO inhibitor is expected to be administered with care along with Scrotonergic agents like SSRI, antidepressants, and it must be well monitored.

Bone marrow suppression is toxicity related with time and not Nephrotoxicity. Bioavailability in Zyvox is very excellent ; with transition from IV.PO with a ratio of 1:1.

7 0
4 years ago
In an agile team who is responsible for tracking the tasks
Alik [6]

Answer:

All team members

Explanation:

In respect of the question, the or those responsible for tracking the tasks in an agile team comprises of all the team members.

Agile in relation to task or project management, can be refer to an act of of division of project or breaking down of project or tasks into smaller unit. In my opinion, these is carried out so that all team members can be duly involved in the tasks or project.

5 0
4 years ago
. What is an APT? What are some practical strategies to protect yourself from an APT?
viva [34]

Answer and Explanation:

Advanced Persistent Threat abbreviated as APT is a type of cyber attack which gives access to the unauthorized user  to enter the network without being detected for a long period.

APTs are generally sponsored by the government agencies of the nation or large firms. For example, one of the ATPs used was Stuxnet in the year 2010 against Iran, in order to put off the nuclear program of Iran.

Some of the practical strategies for protection against APT are:

  • Sound Internal Auditing
  • Strong Password Accessing Policies
  • Stringent policies for accessing any device
  • Introduction and implementation of multi factor authentication
  • Strong IDs and sound honeypot solutions
3 0
3 years ago
Sound effects are located within the Microsoft® Office applications. In the Insert ribbon, what would you select to find pre-pro
babymother [125]
Sometimes clip art has sound files in them, it may have gotten updated though, that answer is the only one that could work.
7 0
3 years ago
Consider two communication technologies that use the same bandwidth, but Technology B has twice the SNR of technology A. If tech
MrRissso [65]

Answer:

55kbps

Explanation:

7 0
4 years ago
Other questions:
  • Write the java statement to creat an object mp4 class digital​
    8·1 answer
  • Which process is used for sending invitations to players to start a game?
    9·2 answers
  • What is an umbrella of software programs that may include​ CAD/CAM, product​ routing, maintenance, and other product​ concerns?
    11·1 answer
  • Which scenario shows the best example of intrinsic motivation?
    13·2 answers
  • Rachel is a junior system administrator for a network with a single Active Directory domain. The network has just expanded to in
    6·1 answer
  • To connect several computers together, one generally needs to be running a(n) ____ operating system
    12·1 answer
  • Which group allows you to add notes to your presentation?
    8·2 answers
  • From which latin word the word computer is derived​
    7·1 answer
  • Write a sub-program to display the acceleration of car. The program should ask initial velocity, final velocity, and time taken
    10·1 answer
  • Write the text of the program in Python.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!