The most important or powerful computer in a typical network is _____ 1) Desktop 2) Network client 3) Network server 4) Network station 5) None of these

1 Answer

Answer :

Answer :3

Related questions

Description : _____ is the most important/powerful computer in a typical network a) Desktop b) Network client c) Network server d) Network station e) None of these

Last Answer : c) Network server

Description : The most important or powerful device in computer in a typical network is: a) desktop b) network client c) network server d) network station e) None of The Above

Last Answer : c) network server

Description : The most powerful computer in a typical network is network server. -Technology

Last Answer : TrueA server is a main computer that manages resources to other computers connected to a network.

Description : Point out the wrong statement. a) Google App Engine lets you deploy the application and monitor it b) From the standpoint of the client, a cloud service provider is different than any other networked ... be brought to bear to solve mobile, desktop, and local server issues d) All of the mentioned

Last Answer : From the standpoint of the client, a cloud service provider is different than any other networked service

Description : . A _____ DBMS distributesdata processing tasks between the workstation anda network server. A. Network B. Relational C. Client Server D. Hierarchical E. None of the above

Last Answer : Client Server

Description : The reasons leading to popularity of client-server systems are: A) More powerful workstations on LANs B) Needed for graphical user interfaces of end users. C) Remove computing load for presentation services from the system managing a shared database resource. D) All

Last Answer : D) All

Description : Which of the following Operating Systems do you choose to implement a client Server Network 1) MS DOS 2) Windows 7 3) Windows XP 4) Windows 2003

Last Answer : 4) Windows 2003

Description : Which of the following Operating Systems do you choose to implement a client Server Network 1 MS DOS 2 Windows 7 3 Windows XP 4 Windows 2003

Last Answer : 4 Windows 2003

Description : Two or more computers connected to each other of sharing information form a _____ 1) Network 2) Router 3) Server 4) Tunnel 5) Pipeline

Last Answer : Answer :1

Description : 4. What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? A. Desktop, laptop, server B. Personal computer, Internet, mobile telephone C. Hardware, software, networks D. Open computer systems, communication systems, and embedded systems

Last Answer : D. Open computer systems, communication systems, and embedded systems

Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems

Last Answer : d. Open computer systems, communication systems, embedded systems

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : In a star network each node (file server, workstations and peripherals) is connected to a central device called a _____: a) Bug b) Center c) Hub d) None of These

Last Answer : c) Hub

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description :  _____ is a bi-directional, fully duplex communication model that uses a persistent connection between client and server. A. Request-Response B. Publish-Subscriber C. Push-Pull D. Exclusive Pair

Last Answer : D. Exclusive Pair 

Description : It helps a user to have remote access to an application from a server. a) Application virtualization b) Network virtualization c) Desktop virtualization d) Storage virtualization

Last Answer : Application virtualization

Description : What are the features of client server network ?

Last Answer : Client Server Network Features The client-server network is easily expandable. This can be done for tens of thousands of users. Such networks have servers. Server computer hardware is generally advanced and these servers ... why the skills of network users are not so important.

Description : What is a client server network ?

Last Answer : A client server network is a network that has a powerful computer or server for central control and data storage and all other computers or clients are connected to this server. One computer ... comply with the server's security policy. Client-server networks are also called server-based networks.

Description : A client of yours would like to expand with a small bistro in front of her catering kitchen. What do you tell her is one advantage to a peer-to-peer network over a client-server network in her case?

Last Answer : Peer-to-peer networking is less expensive and easier to upkeep.

Description : Find out the components of DHCP: 1) A protocol that delivers host-specific configuration parameters from a server to a host. 2) The client determines its own hardware address; this is normally in a ROM on the hardware. 3) ... or permanent network addresses to hosts. A. 1,2 B. 1,3 C. 2,3 D. 1,2,3

Last Answer : B. 1,3

Description : What is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers? a. Client/server network b. Intranet c. Extranet d. Thin client

Last Answer : c. Extranet

Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client

Last Answer : b. Intranet

Description : A client-server system uses a satellite network, with the satellite at a height of 40,000 kms. What is the best-case delay in response to a request? (Note that the speed of light in air is 3,00,000 km/second). (A) 133.33 m sec (B) 266.67 m sec (C) 400.00 m sec (D) 533.33 m sec

Last Answer : (D) 533.33 m sec Explanation: The request has to go up and down, and the response has to go up and down. The total path length traversed is thus 160.000 km. The speed of light in air and vacuum is 300,000 km/sec, so the propagation delay alone is 160,000/300,000 sec or about 533 msec. 

Description : _______ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses. a) Cybergaming crime b) Memory shaving c) Syn flooding d) Software piracy e) None of these

Last Answer : a) Cybergaming crime

Description : Which of the following systems run an application layer firewall using proxy software? 1) Proxy NAT 2) Proxy client 3) Client 32 4) Proxy server

Last Answer : 4) Proxy server

Description : The.... controls a client computer's resources. 1) Application program 2) Instruction set 3) Operating System 4) Server application

Last Answer : 4) Server application

Description : Which of the following systems run an application layer firewall using proxy software? 1 Proxy NAT 2 Proxy client 3 Client 32 4 Proxy server

Last Answer : 4 Proxy server

Description : The.... controls a client computer's resources. 1 Application program 2 Instruction set 3 Operating System 4 Server application

Last Answer : 4 Server application

Description : State whether the following statement are true. i) An application-level gateway is often referred to as a proxy. ii) In proxy, a direct connection is established between the client and destination server. A) True, False B) False, True C) True, True D) False, False

Last Answer : A) True, False

Description : While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part.................to the SSL code on the server. A) 420 B) 1032 C) 443 D) 322

Last Answer : C) 443

Description : ............. is a set of information that is exchanged between a client and web browser and a web server during an HTTP transaction. A) infoset B) clientinfo C) cookie D) transkie

Last Answer : C) cookie

Description : XMPP uses ________ architecture. A. Decentralized client-server B. Centralized client-server C. Message D. Public/subscriber

Last Answer : A. Decentralized client-server

Description : MQTT is: A. Based on client-server architecture B. Based on publish-subscribe architecture C. Based on both of the above D. Based on none of the above

Last Answer : B. Based on publish-subscribe architecture

Description : Most Powerful $2500 Desktop Computer?

Last Answer : Say hello to the V3 Convoy Desktop Computer from V3, a small boutique well known by computer insiders to quietly crank out the most powerful desktops in existence. For $2500 you get a RAID 0 array ... two Zotac GeForce GTX 570 cards. Can get an Unreal Tournament screen up to 225 frames per second.

Description : Forensics is the systematic trucking of incoming and outgoing ruffic on your network (a) Network (b) Computer (c) Criminal (d) Server

Last Answer : d) Server

Description : When a client computer sends a request to a Domain Name System (DNS) server, what type of packet is sent?

Last Answer : DNS primarily uses the User Datagram Protocol (UDP) on port number 53 to serve requests. DNS queries consist of a single UDP request from the client followed by a single UDP reply from the server. ... the answer exceeds 512 bytes and both client and server support EDNS, larger UDP packets are used.

Description : Will desktop computers soon become obsolete do to the newer, more powerful laptop computers?

Last Answer : LCD and DLP projectors typically have a lamp life between 2000-4000 hours. This specification is actually referring to the 'half-life' of the lamp. The half-life is the point where ... , lamp replacement cost should be factored into your purchase. Replacement lamps run approximately $200-$400.

Description : How potentially powerful is a majority share email client?

Last Answer : Encrypt your email. All of it, all the time.

Description : Which country's server is the most powerful ? Which country's servers are the most powerful and fastest for running VPN ?

Last Answer : The most powerful server in South America.

Description : How do you manage Gmail with your desktop mail client?

Last Answer : There is no substitute for gmail’s web interface. Is there a reason why you want the desktop email client? For me the whole point of gmail was that it was a step forward.

Description : Does the typical desktop prioritize some inputs over others?

Last Answer : answer:My computer seems to disappear into lala land at such times. But then, it’s a Windows machine. Is it true that Apples never do that? Meaning, I have to do a hard reboot sometimes.

Description : DNS stands for: a) Domain Network Service b) Domain Necessarily Server c) Domain Name System d) None of These

Last Answer : c) Domain Name System

Description : Which among the following is correct characteristics about proxy server: a) A proxy server may act as a firewall by responding to input packets in the manner of an application while blocking other packets. b) A ... as a proxy on behalf of the network user; d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : ____intercepts all messages entering and leaving the network. The _____effectively hides the true network addresses: a) Circuit Level Gateway b) Proxy Server c) Packet Filter d) None of These

Last Answer : b) Proxy Server

Description : Personal Computers can be connected together to form a - 1) Server 2) Supercomputer 3) Network 4) Enterprise

Last Answer : 3) Network

Description : Your company receives internet access through a network or a gateway server. Which of the following devices is best suited to protect resources and subnet your LAN directly on the network server? 1) DSL modem 2) A multi-homed firewall 3) VLAN 4) A brouter that acts both as a bridge and a router

Last Answer : 2) A multi-homed firewall