1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rudik [331]
4 years ago
5

A _____ object is the instance of a class that receives a request from another object. Select one: a. client b. server c. contra

ct d. provider e. CRC
Computers and Technology
1 answer:
creativ13 [48]4 years ago
5 0

Answer:

b. server

Explanation:

A server serves responses to requests from client objects.

You might be interested in
If the user inputs “10” for the first expense and “20” for the second expense, what will the interpreter show in the final line
andriy [413]
Yes :) I totally agree with the person above me ^
7 0
3 years ago
Describe the purpose of shell scripts. Provide one example to reflect the use of variables, constructs, or functions.
Sindrei [870]

Answer:

Kindly check explanation

Explanation:

Shell scripts are used for writing codes which may involve writing together a complete set of task in a single script. These set if codes or instructions could be run at once without having to run this program one after the other on a command line. This way it avoid having to repeat a particular task each time such task is required. As it already combines a sequence of command which would or should have been typed one after the other into a compiled single script which could be run at once.

A shell script could be written for a control flow construct :

if [expression]

then (command 1)

else (command 2)

.....

7 0
3 years ago
Which Internet security risk is associated with dumpster diving?
lora16 [44]

Which Internet security risk is associated with dumpster diving? Identity theft. Identity theft is associated with dumpster diving because it involves taking something from someone else. In this case, instead of looking through a dumpster to get items that were someone elses, they are taking their identity and using it for their own purposes. So identity theft and dumpster diving relate when used in this context.

3 0
4 years ago
Read 2 more answers
Software (often on firmware) designed to make physical products and devices smarter by doing things like sharing usage informati
Katarina [22]

Answer:

Embedded System

Explanation:

Embedded System are designed to make physical products and devices and helping in diagnose problems as well.

3 0
3 years ago
The new Director of Information Technology has asked you to recommend a strategy to upgrade the servers on their network. Recomm
borishaifa [10]

Answer:

servers to be upgraded are : APPLICATION AND LOAD BALANCING SERVERS

servers still appropriate to use : DNS AND DHCP SERVERS

Explanation:

The recommendations to be made in line with what the new director of information is asking for includes :

1 ) For the servers to be upgraded : The servers that requires upgrades  includes the APPLICATION SERVER and LOAD BALANCING SERVER. this is because these two servers are critical to the growth/expansion of any business, and they handle large volume of data

Recommendations on the servers upgrade includes:

Hardware : 2.3 GHz Intel Xeon Gold 5118 12-Core

CPU chip set :  Socket: FCLGA3647, Type: NSBM

Speed : processor 3.2 GHz

caching:   > 100 Gb

2)  For servers that do not necessarily need to be upgraded : The servers that do not need immediate upgrade are DNS and DHCP

6 0
3 years ago
Other questions:
  • How many degrees of freedom does any unconstrained object have in 3-D modeling?
    6·1 answer
  • Reinstalling a software package to fix a problem with an inoperative program is an example of which troubleshooting strategy?
    9·1 answer
  • Leah wants to create a PowerPoint presentation for a history report about the progressive era in the 1900s. To
    6·2 answers
  • Describe two ways the ARPANET is different from the internet
    12·1 answer
  • Write a C++ program that prompt the user to enter three points (x1, y1), (x2, y2), (x3,y3) of a triangle and
    14·1 answer
  • Give sally sue specific suggestions on how she can improve her powerpoint skills
    5·1 answer
  • Which feature of a word processing program enables you to represent an text information in the form of a diagram?
    14·2 answers
  • Which is a disadvantage ofsimulation?
    5·1 answer
  • Which of the following statements about version control are true? Select 3 options.
    7·2 answers
  • Which of the following is Tynker an example of?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!