1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lemur [1.5K]
3 years ago
12

​Client/server computing is​ a: A. network that connects sensors to desktop computers. B. distributed computing model where clie

nts are linked to one another through a network that is controlled by a network server computer. C. centralized model of computing for large corporations. D. network where centralized mainframe computers serve local devices. E. centralized computing model where local computers are connected to one another by a network.
Computers and Technology
1 answer:
creativ13 [48]3 years ago
5 0

Answer:

B. distributed computing model where clients are linked to one another through a network that is controlled by a network server computer.

Explanation:

Client - server computing model is a distributed network where it functions between two types of independent and autonomous processors: servers and clients.

In <em>Client/Serer computing</em> model, different nodes of clients make requests from a centralized host computer (server), and the server responds these requests and shares its resources.

In other words, servers are the devices which have the ability of serving requests made by clients.

You might be interested in
The operations planning practice of inputting sales forecasts into computer software that accurately predicts the amount and tim
netineya [11]

Answer:

"Materials requirement planning" is the correct answer for the above question.

Explanation:

  • The "Materials requirement planning" is a software system that is used to hold the record of the raw materials.
  • It is used to tell about the material which is present in the stocks. It also used to schedule the delivery.
  • This software is used to enhance the productivity of the company.
  • The above question asked about the software which is needed to keep the record of the raw material. This software is known as "Materials requirement planning".
3 0
3 years ago
Jack, a skillful hacker targeted a major banking services firm located in Japan, using the LOIC (Low Orbit Ion Cannon) tool, Jac
Elenna [48]

Answer:

denial-of-service attack (DoS attack) and distributed denial-of-service attack (DDoS attack)

Explanation:

Denial-of-service attack -

It is a type of cyber attack , where the hacker can create a machine or any network resource , which is capable to disrupt the server of the host , with the help of the internet , is referred to as the denial of service attack .

The task is accomplished with by flooding the host with many superfluous requests , which can overload the system .

In case of the distributed denial-of-service attack , the flooding is done by many different sources .

Hence , from the given scenario of the question ,

The correct answer is  denial-of-service attack (DoS attack) and distributed denial-of-service attack (DDoS attack) .

4 0
3 years ago
how could environmental and energy problem Kenya faces as far computer installations are concerned be avoided​
ipn [44]

The environmental and energy problem Kenya faces as far computer installations are concerned can be avoided​ by

  • Knowing and finding out the key aspect of ICT strength.
  • Create an holistic judgements in the assessment of ICT capability. Promote the use of solar power.

<h3>How can we overcome ICT challenges?</h3>

There are a lot of Energy Challenges in terms of ICT  in Kenyan and it is good the government and the people work towards energy in terms of sustainable ICT.

Therefore, The environmental and energy problem Kenya faces as far computer installations are concerned can be avoided​ by

  • Knowing and finding out the key aspect of ICT strength.
  • Create an holistic judgements in the assessment of ICT capability. Promote the use of solar power.

Learn more about computer installations from

brainly.com/question/11430725

#SPJ1

7 0
2 years ago
If David wishes to digitally sign the message that he is sending Mike, what key would he use to create the digital signature
Goshia [24]

The key would he use to create the digital signature is Mike public key.

<h3>Which key is used to sign messages?</h3>

Digital signatures are known to be used via public key. Here, the person is said to be one who is said to produce or creates the digital signature that  uses a private key to encrypt signature-linked data.

The only way to decrypt a data is only with the signer's public key, the key David would use to create the digital signature is Mike public key.

Learn more about  public key from

brainly.com/question/17486027

7 0
2 years ago
Please answer this question​
RSB [31]

Answer:

what is the other language

is it Assamese clarify me in the comment section bro

4 0
3 years ago
Other questions:
  • You are able to change the formatting of a table after it is inserted into a placeholder. True or false
    9·2 answers
  • The process of changing data from their original form to a format that more closely fits the research objectives of the research
    9·1 answer
  • You are configuring two switches of different vendors such that they connect to each other via a single link that will carry mul
    13·1 answer
  • What are some ways tables can be inserted into a document? Check all that apply.
    5·2 answers
  • In 2d design, form makes what possible?
    15·1 answer
  • Who initially developed what is now known as the internet?
    5·1 answer
  • In the value chain concept, upgrading IT is considered what kind of activity?
    9·1 answer
  • How can you reduce the Impact of Hacking? <br>pls help with this &lt;3​
    9·1 answer
  • define a computer, state its 3 main activities with examples of the functions of each of those activities​
    7·1 answer
  • What are two differences between a wide angle lens and a telephoto lens?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!