1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
antiseptic1488 [7]
3 years ago
8

In which client/server relationship can a computer act as both a client AND a server? Select one: a. X-Windows b. SSH c. Classic

View d. Peer-to-Peer e. None of these
Computers and Technology
1 answer:
Ivanshal [37]3 years ago
3 0

Answer: d) Peer-to-Peer

Explanation:

Peer-to-peer(P2P) is the the system in which computer system are linked with reach other through internet connectivity. There is no requirement of central server for file sharing and transmission. Thus, it can act as client and file server in a network for file and data transmission.

  • Other options are incorrect because classic view,X-Window and SSH(Secure Shell) are not the relationships that have the potential to behave as client and server for cooperation of programs.
  • Thus, the correct option is option(d).
You might be interested in
20 points
adoni [48]
Yes it's important. It's like taking jotting down the ideas you have for a project, you don't want to forget anything, and these things help you keep track of what you want to do.

Answer would be false.
4 0
3 years ago
What are the basic tools for coding HTML manually?
ipn [44]
The answer should be C, you need a text editor to write out the code, and then a web browser to view what the code creates.
5 0
3 years ago
Read 2 more answers
________ is malware that hijacks a user's computer and demands payment in return for giving back access.
Lera25 [3.4K]

Ransom  malware that hijacks a user's computer and demands payment in return for giving back access.

<h3>What is Ransom malware?</h3>

This is known to be a kind of  malware that hinders users from gaining in or access to their system or personal files and it is one that often demands ransom payment so as to get access.

Therefore, Ransom  malware that hijacks a user's computer and demands payment in return for giving back access.

Learn more about Ransom  malware from

brainly.com/question/27312662

#SPJ12

6 0
2 years ago
Name the different types of constructors that a designer can provide in a class. Provide an example with a class showing many co
Marrrta [24]
By default, if you do not implement a constructor, the compiler will use an empty constructor (no parameters and no code). The following code will create an instance of the MyObject class using the default constructor. The object will have the default vauesfor all the attributes since no parameters were given.

MyObject obj = new MyObject();

Another type of constructor is one with no parameters (no-arg constructor). It is similar to the default, except you actually create this constructor. The contents of the the constructor may include anything. To call a no-arg constructor, use the same line of code as above. The constructor can look like the one below:

public MyObject() {
System.out.println("This is a no-arg constructor");
}

Lastly there is the parameterized constructor. This type of constructor takes in parameters as inputs to assign to values in the newly created object. You call a parameterized constructor as follows:

MyObject obj = new MyObject("Bob", 20);

The constructor will look like this:

public MyObject(String name, int age) {
this.name = name;
this.age = age;
}

In the constructor, the keyword "this" refers to the object, so this.name is a private global variable that is being set equal to the inputted value for name, in this case "Bob".

Hope this helps!
8 0
3 years ago
What is the function of ROM?
Gnoma [55]

Answer:

Hello, There!

<h2>Your Question↓</h2>

What is the function of ROM?

<h2>Answer↓</h2>

Allows parts of the computer to communicate is the Correct Answer.

Explanation:

<h2>Now you May Ask What does it do or How it works↓</h2>
  • ⇒ROM provides the necessary instructions for communication between various hardware components.
  • ⇒ it is essential for the storage and operation of the BIOS, but it can also be used for basic data management, to hold software for basic processes of utilities.

Tip: Wanna know how to earn points back for asking your Question?

If you do it's easy just when two people answer your question whichever answer you think is the best click the crown on the side to get 25% of your points back! :D

Therefore, I hope this helps!

6 0
2 years ago
Other questions:
  • g Suppose the vertex data is stored in an array named verts and each vertex uses a list to store the coordinates. Write the code
    7·1 answer
  • Can a spreadsheet be filtered only by one column at a time?
    11·1 answer
  • What happens when a filter is applied to a database
    15·1 answer
  • Which turn best describe news one is connected to the government and is used as a political tool more than as a business product
    12·1 answer
  • What integer is represented by the following 8-bit twos complement representation: 1011 0000 ? (Enter your number in decimal, an
    6·1 answer
  • Computers help eliminate that repetitive of manual task. How can this benefit you in in your overall career
    7·2 answers
  • Why do we need to make a plan before actions?
    7·1 answer
  • List at least 5 professions for people working in the Information/Communication<br> fields.
    10·1 answer
  • How to deactivate the brainly account?​
    13·1 answer
  • Who has a brainpop acct. can i pls use it !
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!