1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
geniusboy [140]
3 years ago
8

The stub: transmits the message to the server where the server side stub receives the message and invokes procedure on the serve

r side. locates the connection on the computer. packs the parameters into a form transmittable over the hardware. locates the port on the computer.
Computers and Technology
1 answer:
elena55 [62]3 years ago
3 0

Answer:

It does all of these

Explanation:

The stub is able to do all of what we have in this question. It can locate computer connections, locate ports on a computer, transit message to server etc.

in distributed computing, a stub is a piece of code that does the work of converting parameters that are passed between the client and the server at a time of remote procedure call.

The main objective of an RPC is to allow the client to call procedures remotely on another server.

You might be interested in
QUESTION 1
slava [35]
Answer is Bit defender Internet security
B
6 0
3 years ago
The java class library interface queue method tagg retrieves the entey at the front of a queue but themrows a NosuchElementExcep
SCORPION-xisa [38]

Answer:D) peek

Explanation:Peek operation or function is the method that is used for the returning of the values on the front of the queue or stack type datatypes.               This operation function over those datatypes having group or collection of the elements and does not eliminate any element from the queue.

NOsuchElemnet exception is shown when there is the peek operation in the queue for the element to be displayed on the top and no deletion can take place .Thus, the correct option is option(D).

5 0
3 years ago
U2- an example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.
Ivan
The answer is "masquerade".
4 0
3 years ago
Select the correct answer.
irinina [24]

Answer:

A

Explanation:

6 0
3 years ago
Which of the following is NOT a font style?<br> Italic<br> Bold<br> Regular<br> Iconic
madam [21]

Answer:

iconic

Explanation:

iconic iconic iconic

8 0
3 years ago
Read 2 more answers
Other questions:
  • What microsoft operating systems started the process of authenticating using password and username
    14·1 answer
  • Explain how to use fortran programming in details
    14·1 answer
  • What type of firestopping technology expands as much as 25 times in volume?
    6·1 answer
  • Cryptolocker is an example of what type of malware?
    11·1 answer
  • Now the y0utube home screen is gone
    13·2 answers
  • The image below shows an encoding for a black and white pixel image. The first two
    13·1 answer
  • A video game controller contains the buttons: A, B, X, Y. When the player presses A their character Jumps. When the player press
    15·1 answer
  • What is the difference between autofocus and autocomplete
    8·1 answer
  • It takes Mike 18 minutes to finish reading 4 pages of a book. How long would it take for him to finish 30 pages ?​
    9·1 answer
  • Software piracy is acceptable as it helps us obtain software cheaper or sometimes even for free.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!