1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leni [432]
4 years ago
6

What is the fundamental difference between a fat-client and a thin-client approach to client server systems architectures?

Computers and Technology
1 answer:
AlekseyPX4 years ago
3 0

Client server architecture

In this set up, the servers are workstations which perform computations or provide services such as print service, data storage, data computing service, etc. The servers are specialized workstations which have the hardware and software resources particular to the type of service they provide.

<em>Examples </em>

1. Server providing data storage will possess database applications.

2. Print server will have applications to provide print capability.

The clients, in this set up, are workstations or other technological devices which rely on the servers and their applications to perform the computations and provide the services and needed by the client.

The client has the user interface needed to access the applications on the server. The client itself does not performs any computations while the server is responsible and equipped to perform all the application-level functions.

The clients interact with the server through the internet.

Clients can be either thin client or thick (fat) client.

<em>The differences in them are described below. </em>

1. Thin client, as per the name, performs minimal processing. Thick or fat client has the computational ability necessary for the client.

2. The thin client possesses basic software and peripherals and solely relies on the sever for its functionalities. Fat client has the resources needed to do the processing.

3. The user interface provided by the thin client is simpler and not rich in multimedia. The user interface provided by the fat client is much better and advanced.

4. Thin client relies heavily on the server. Fat client has low dependency on the server.

5. In the thin client set up, servers are present in more number. In this set up, servers are present in less number.

6. Each server handles a smaller number of thin clients since all the processing is done at the server end. Each server handles more thick clients since less processing is done at the server end.

You might be interested in
Investigations involving the preservation, identification, extraction, documentation, and interpretation of computer media for e
Goryan [66]

Answer:

The correct answer to the following question will be "Digital Forensics".

Explanation:

  • Digital forensics is a field of forensics that involves the analysis and retrieval of materials found in electronic devices, sometimes related to cybercrime.
  • The objective of digital forensics methodologies would be to check, maintain and evaluate evidence on computing systems to find possible evidence for a trial. In the initial days of computing, an individual investigator could process files because the power consumption was so small.

Therefore, Digital Forensic is the right answer.

7 0
4 years ago
A program that accepts insurance policy data, including a policy number, customer last name, customer first name, age, premium d
valentina_108 [34]

Answer:

  1. policy_num = int(input("Enter policy number: "))
  2. lastName = input("Enter last name: ")
  3. firstName = input("Enter first name: ")
  4. premiumDate = input("Enter premius due date (mm/dd/yyyy): ")  
  5. numAcc = int(input("Enter number of driver accident in the past three years: "))
  6. if(policy_num <1000 or policy_num > 9999):
  7.    policy_num = 0  
  8. dateComp = premiumDate.split("/")
  9. month = int(dateComp[0])
  10. day = int(dateComp[1])
  11. year = int(dateComp[2])
  12. if(month < 1 or month > 12):
  13.    month = 0
  14.    day = 0
  15.    year = 0  
  16. else:
  17.    if(month == 1 or month == 3 or month == 5 or month == 7 or month == 8 or month == 10 or month == 12):
  18.        if(day < 1 or day > 31):
  19.            month = 0
  20.            day = 0
  21.            year = 0  
  22.    elif(month == 4 or month == 6 or month == 9 or month == 11):
  23.        if(day <1 or day > 30):
  24.            month = 0
  25.            day = 0
  26.            year = 0
  27.    elif(month == 2):
  28.        if(day < 1 or day > 29):
  29.            month = 0
  30.            day = 0
  31.            year = 0
  32. print("Policy number: " + str(policy_num))
  33. print("Last name: " + lastName)
  34. print("First name: " + firstName)
  35. print("Premium Date: " + str(month) + "/" + str(day) + "/" + str(year))
  36. print("Number of driver accidentin the last three years: " + str(numAcc))

Explanation:

The solution code is written in Python 3.

Firstly use input function to prompt user to enter all the necessary insurance policy data (Line 1 - 5).

Next create an if statement to validate the input policy number. If the policy number is not within the range of 1000 - 9999, set the policy number to zero (Line 7 -8).

Next, split the input premium date into month, day and year (Line 10 -13). It is followed by checking the month if it is between 1 - 12. If not, set the month, day and year to zero (Line 15 - 18). Otherwise the program will proceed to validate the month based on the maximum and minimum number of days for a particular month (Line 20 - 34). If the day is out of range, set month, day and year to zero.

Lastly, use print function to display the policy data (Line 36 - 40).

8 0
4 years ago
A team member who does not feel comfortable disagreeing with someones opinion in front of the team would most likely come from a
Sedbober [7]

Answer:

discussions and decisions made about public policy

Explanation:

7 0
2 years ago
1. (15%) Consider a computer system with three users: Alice, Bob, and Cyndy. Alice owns the file a, and Bob and Cyndy can read i
Fantom [35]

Answer:

answered in Image and explanation is given below.

Explanation:

CL is euqal to user permission on every file

ACL is equal to how permissions are defined for one life for example File a, read, write, execute.

4 0
3 years ago
How is social media changing the world as we know it?
Alisiya [41]

Answer:

Explanation:

Social media is making it easier to make a lot of noise about a pressing issue in society, such as human rights violations.

I use social media because I want to keep tabs on people I know.

A change in social media is that people have become increasingly overreliant on it. We tend to spend increasing amounts of time on social media.

Social media should be INFORMATIVE about presidential elections, and it should not be used to spread baseless information. This way, people are more informed about the facts of the candidates and their platforms.

Social media has paved the way for me to make new relationships to important people in my life.

Social media does pose a threat to family and leisure time when said family members tend to be overreliant on the phones and ignore those around them.

The person who is addicted to social media is myself because I spend several hours on it everyday— and that much interaction is too much because it should be one hour a day at most.

I have experienced cyberbullying; the solution to this problem is accountability and finding those who instigate it to bring them to justice.

3 0
3 years ago
Other questions:
  • Carlos owns a hardware store. He currently is not using any software to track what he has in the store. In one to two sentences,
    9·2 answers
  • To what device, inside the computer, do all other devices connect
    10·2 answers
  • Why is it important for people to express resentments in the workplace?
    9·1 answer
  • What process does a system use to officially permit access to a file or a program CIS 502 ?
    11·1 answer
  • Write a program segment that simulates flipping a coin 25 times by generating and displaying 25 random integers, each of which i
    5·1 answer
  • In ____________, a large address block could be divided into several contiguous groups and each group be assigned to smaller net
    7·1 answer
  • The World Wide Web is a program that allows you to search for information on the Internet.
    9·1 answer
  • An organization has hired a new remote workforce. Many new employees are reporting that they are unable to access the shared net
    11·1 answer
  • Which tools is used to bundle cables neatly inside and outside of a computer?​
    15·1 answer
  • A market-product strategy that requires no change in the basic product but instead seeks new buyers is known as ______
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!