1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlada [557]
3 years ago
6

The ________ tier of the three-tier architecture consists of computers, phones, and other mobile devices that have browsers that

request and process W
Computers and Technology
1 answer:
andrey2020 [161]3 years ago
6 0

Answer:

It is the user tier of the 3-tier architecture that consists of computers, phones, and other mobile devices that have browsers that request and process web pages.

Explanation:

Almost if not all applications that use e-commerce for operations use the 3-tier architecture.  3-tier architecture is simply the arrangement of server tier which consists of all computers that run a web server and a database tier that consists of computers that run a DBMS to store and retrieve data. We also have the user data that consists of computers, phones, and other mobile devices that have browsers that request and process web pages.

When you make a request, for instance to Google in your local browser, the browser sends a request to the internet. This initial interaction between the user and the internet is what is known as the user tier of the 3 tier architecture. Basically, it is the phase where end users access content online through graphical interface browsers and make requests to the web servers and DBMS.

Learn more about 3-tier architecture

brainly.com/question/12627823

#LearnWithBrainly

You might be interested in
.A card that connects directly to the motherboard of the computer and has external sockets so that the computer can be connected
mylen [45]

Answer: Network interface controller

Explanation:

A network interface controller is also referred to as the network adapter or LAN adapter. It is simply a component of the computer hardware that is used to connects a computer system to a particular network.

It is a card that connects directly to the motherboard of the computer and has external sockets so that the computer can be connected to a network via cables.

6 0
3 years ago
Circular errors are caused by adding the cell name of _______ cell to its own formula.
Sati [7]

Circular errors are caused by adding the cell name of the active cell to its own formula.

8 0
3 years ago
Describe the role of a chemist and the role of a chemical engineer
Andreas93 [3]
Chemist is chemist research and experiments

Chemical engineer is engineers concerned with the design and operation of industrial chemical plant
3 0
4 years ago
What are the limitations of the ASCII character set? State why it is limited in this way?
dedylja [7]
The problem with ASCII or extended ASCII is that the ASCII system can only represent up to 128 (or 256 for EASCII) different characters. The limitation on the number of character sets means representing character sets for several different language structures is not possible.
7 0
3 years ago
Many people in modern society have the notion that hard disks can be searched in an hour and files can be recovered from inciner
atroni [7]

Answer:

The CSI effect.

Explanation:

  • The process of recovering the file or the directory from the hard disks that are  burned by teaming them up to a computer is known as the CSI effect in the hard disk.
  • This term is given by the expertise in the organization and it is used in the modern  society  .The CSI is used for only the hard disk in the computer system.
5 0
4 years ago
Other questions:
  • Why is ipsec considered to be a transparent security protocol?
    6·1 answer
  • What kind of battery does a dji spark have?
    12·1 answer
  • The ELECTRONIC COMMUNICATIONS PRIVACY ACT prohibits unauthorized eavesdropping by all persons, businesses, and the government.
    5·1 answer
  • Hey you know Python? Could you help me, please? It's for my Final please help me SOS.
    8·1 answer
  • Explain what a lookup table is (assembly). Write pseudo code
    13·1 answer
  • An online bank wants you to create a program that shows prospective customers how their deposits will grow. Your program should
    13·1 answer
  • ou have a company network that is connected to the internet. You want all users to have internet access, but you need to protect
    13·1 answer
  • What is the maximum number of characters you can have in a file name​
    8·1 answer
  • Write a Python function that join the two string and print it ​
    14·2 answers
  • the handles the overall activity of the computer and provides services such as memory management, input/output activities, and s
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!