1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LuckyWell [14K]
2 years ago
7

In what type of cluster does every server perform useful work so that if one fails, the remaining servers take on the additional

load?
Computers and Technology
1 answer:
77julia77 [94]2 years ago
7 0
<span>The term computer cluster denotes a combination (clustering) of two or more servers that are interconnected to appear as one. </span>In the symmetric server cluster every server perform useful work so that if one fails, the remaining servers take on the additional load.
<span>In this type of cluster system all N hosts are running the application.</span>
You might be interested in
In 4-bit sign magnitude representation, what is the binary encoding of the number -5?
matrenka [14]
Answer:B
Step-by-step explanation:
5 0
2 years ago
Hiiiiiiiiiii hiiiiiiiiiiiiiiiiiii
jenyasd209 [6]

Gimme Brainliest.

--------------------------

5 0
3 years ago
Read 2 more answers
Which access object cannot be used to enter or edit data
kap26 [50]

Answer:

Should be B. table !

6 0
1 year ago
Read 2 more answers
The numeric keys on the keyboard are sometimes called the ten keypad. true false
mr_godi [17]
The answer is true...
8 0
2 years ago
Read 2 more answers
Which one of the following oscilloscope controls is used to move the trace up and down the screen vertically? A. Focus B. Sweep
irga5000 [103]
The answer is A Focus hope it helps
7 0
2 years ago
Read 2 more answers
Other questions:
  • Software that manages and supports the resources of a computer is known as?
    10·1 answer
  • What is the difference between a software engineer and a system analyst?
    8·1 answer
  • Enum Digits {0, 1};
    10·1 answer
  • An IT professional with a customer-service
    13·1 answer
  • Name two materials that we can burn in order to get energy from biomass
    9·1 answer
  • Devices which are used to receive data from central processing unit are classified as
    11·1 answer
  • Phishing is ____________. When hackers overwhelm a website with too many requests. A network of private computers infected with
    7·1 answer
  • Why is it important to isolate evidence-containing devices from the internet?
    11·1 answer
  • A merchant bank and a merchant have been involved in a Web-based electronic transaction. Which of the following mediates between
    9·1 answer
  • PLS HELP MEE it's due in 2 minutes​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!