What is a client and a server?

1 Answer

Answer :

Client and Server are computers which are connect on the same network it may be Local area network LAN or wide area network WAN, BUT the CLIENT IS THE REQUESTING MACHINE WHILE THE SERVER IS THE SUPPLYING MACHINE.  

Related questions

Description : What is the best and faster way to transfer a DataTable from server side to client side: using JSON format or pure HTML?

Last Answer : Unless there is a good reason to write the displayed data cient side, pure HTML should be more efficient. It should display in a browser faster. Also, the server side source code is visible to ... HTML generated client side will not be visible to any bot that does not have a JavaScript interpreter.

Description : In WWW a client is called ……….. and a server is called ……… -Technology

Last Answer : Web browser, Web server

Description : Which software model is best suitable for client server application? -Technology

Last Answer : Concurrent Process model is best suitable for client server application.

Description : What is Client Server Architecture ?

Last Answer : Client Server Architecture There is always a host called Server. This server serves many other hosts , called clients. The client host does not need to be on all the time. A notable feature of ... server at any time. Notable examples of client server architecture are web , e-mail rematch login etc.

Description : What are the features of client server network ?

Last Answer : Client Server Network Features The client-server network is easily expandable. This can be done for tens of thousands of users. Such networks have servers. Server computer hardware is generally advanced and these servers ... why the skills of network users are not so important.

Description : What is a client server network ?

Last Answer : A client server network is a network that has a powerful computer or server for central control and data storage and all other computers or clients are connected to this server. One computer ... comply with the server's security policy. Client-server networks are also called server-based networks.

Description : What approaches to server and client development do you know?

Last Answer : Whenever you use an ATM to check your balance or withdraw some money, you are actually participating in a client-server interaction with a computer on your bank's network. A client-server network ... socket, locates the Web page requested and sends it over the Internet to the user's browser.

Description : Is terminal server load balancing the responsibility of the client or the host?

Last Answer : Server load balancing is almost always the hosts responsibility. Even in the case of terminal severs, the host should ensure proper connections to the server.

Description : A client of yours would like to expand with a small bistro in front of her catering kitchen. What do you tell her is one advantage to a peer-to-peer network over a client-server network in her case?

Last Answer : Peer-to-peer networking is less expensive and easier to upkeep.

Description : When a client computer sends a request to a Domain Name System (DNS) server, what type of packet is sent?

Last Answer : DNS primarily uses the User Datagram Protocol (UDP) on port number 53 to serve requests. DNS queries consist of a single UDP request from the client followed by a single UDP reply from the server. ... the answer exceeds 512 bytes and both client and server support EDNS, larger UDP packets are used.

Description : The most important or powerful computer in a typical network is _____ 1) Desktop 2) Network client 3) Network server 4) Network station 5) None of these

Last Answer : Answer :3

Description : Where is a procedure return in an external pl/sql library executed at the client or at the server?

Last Answer : At the client.

Description : Where is the external query executed at the client or the server?

Last Answer : At the server.

Description : Why are OPS$ accounts a security risk in a client/server environment? (for DBA

Last Answer : f you allow people to log in with OPS$ accounts from Windows Workstations, you cannot be sure who they really are. With terminals, you can rely on operating system passwords, with Windows, you ... of whether you have identified your ID with a password or defined it to be IDENTIFIED EXTERNALLY.

Description : What is used to see if a client is still connected to a NetWare server? A. Spoofing TCP/SAP B. Watchdog packet C. GNS Round Robin D. DNS Round Robin

Last Answer : Watchdog packet

Description : . A _____ DBMS distributesdata processing tasks between the workstation anda network server. A. Network B. Relational C. Client Server D. Hierarchical E. None of the above

Last Answer : Client Server

Description : In one of the pairs of protocols given below, both the protocols can use multiple TCP connections between the same client and the server. Which one is that? a. HTTP, FTP b. HTTP, TELNET c. FTP, SMTP d. HTTP, SMTP

Last Answer : a. HTTP, FTP

Description : Consider different activities related to email: m1: Send an email from a mail client to a mail server m2: Download an email from mailbox server to a mail client m3: Checking email in a web browser Which is the application ... FTP m3: HTTP c. m1: SMTP m2: POP m3: HTTP d. m1: POP m2: SMTP m3: IMAP

Last Answer : c. m1: SMTP m2: POP m3: HTTP

Description : Which DNS client maps an address to a name or a name to an address especially when required by a host? a. Resolver b. Mapper c. Primary Server d. Secondary Server

Last Answer : a. Resolver

Description : What is the main function of Session layer in OSI model? a. Defines how data is formatted between the devices b. Made physical connection between server and client c. Both a and b d. None of the above

Last Answer : a. Defines how data is formatted between the devices

Description : In which layer of OSI client send request to the server? a. Application layer b. Presentation layer c. Session layer d. Transport layer

Last Answer : c. Session layer

Description : SSL is not responsible for a. Mutual authentication of client & server b. Secret communication c. Data Integrity protection d. Error detection and correction

Last Answer : d. Error detection and correction

Description : While transferring files between server and client, if the transmission rates along the path is 10Mbps, 20Mbps, 30Mbps, 40Mbps. The throughput is usually a. 20Mbps b. 10Mbps c. 40Mbps d. 50Mbps

Last Answer : b. 10Mbps

Description : Find out the components of DHCP: 1) A protocol that delivers host-specific configuration parameters from a server to a host. 2) The client determines its own hardware address; this is normally in a ROM on the hardware. 3) ... or permanent network addresses to hosts. A. 1,2 B. 1,3 C. 2,3 D. 1,2,3

Last Answer : B. 1,3

Description : State weather the following statement is true or false for Sendmail. 1).Sendmail is a command-line tool designed for most UNIX-like operating systems. 2).It define a method of transferring mail, and acts as a client/server ... . false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : A. 1. True, 2. False, 3. true

Description : The Post Office Protocol is an ………... protocol with both client (sender/receiver) and …………...functions A. electronic mail, server (storage) B. three layer , server C. UDP, transfer D. TCP, server

Last Answer : A. electronic mail, server (storage)

Description : The client code recognizes the SSL request and establishes a connection through TCP port ____ to the SSL code on the server A. 1023 B. 402 C. 443 D. 8080

Last Answer : C. 443

Description : Which DNS client maps an address to a name or a name to an address especially when required by a host? A. Resolver B. Mapper C. Primary Server D. Secondary Server

Last Answer : A. Resolver

Description : The most important or powerful device in computer in a typical network is: a) desktop b) network client c) network server d) network station e) None of The Above

Last Answer : c) network server

Description : _______ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses. a) Cybergaming crime b) Memory shaving c) Syn flooding d) Software piracy e) None of these

Last Answer : a) Cybergaming crime

Description : _____ is the most important/powerful computer in a typical network a) Desktop b) Network client c) Network server d) Network station e) None of these

Last Answer : c) Network server

Description : Which of the following Operating Systems do you choose to implement a client Server Network 1) MS DOS 2) Windows 7 3) Windows XP 4) Windows 2003

Last Answer : 4) Windows 2003

Description : Which of the following systems run an application layer firewall using proxy software? 1) Proxy NAT 2) Proxy client 3) Client 32 4) Proxy server

Last Answer : 4) Proxy server

Description : The.... controls a client computer's resources. 1) Application program 2) Instruction set 3) Operating System 4) Server application

Last Answer : 4) Server application

Description : Which statement best describes the relationship between application, server, and client in a multitenancy environment? A. Single instance of software running on a server and serves one client. B ... clients. D. Multiple instances of software running on multiple servers and serves one client.

Last Answer : Single instance of software running on a server and serves multiple clients.

Description : VLANs and IP addresses resources are made available to end user via? A. Server virtualization. B. Client virtualization. C. End-user virtualization. D. IaaS

Last Answer : Server virtualization

Description : Who provide GUI (Graphical User Interface) to interact with the cloud? A. Client B. Application C. Client Infrastructure D. Server

Last Answer : Client Infrastructure

Description : Point out the wrong statement. a) All IM clients use peer-to-peer messaging b) IM software aimed at businesses such as XMPP, Lotus Sametime, and Microsoft Office Communicator use a client/server ... messaging is as popular in business as it is in personal communications d) None of the mentioned

Last Answer : None of the mentioned

Description : Every call to publish() will return a class that conforms to the __________ interface. a) Batch b) Client c) Server CSE-R17.BLOGSPOT.COM d) Future

Last Answer : Future

Description : When you publish a message ________ is automatically created? a) Client b) Server c) Batch d) Server

Last Answer : Batch

Description : ________ method publishes messages to pub/sub. a) Client() b) Publish() c) Server() d) Batch()

Last Answer : Publish()

Description : Publishing messages is handled through ________ Class. a) Client() b) Server() c) Publish() d) Batch()

Last Answer : Client()

Description : Point out the wrong statement. a) Google App Engine lets you deploy the application and monitor it b) From the standpoint of the client, a cloud service provider is different than any other networked ... be brought to bear to solve mobile, desktop, and local server issues d) All of the mentioned

Last Answer : From the standpoint of the client, a cloud service provider is different than any other networked service

Description : Which of the following Operating Systems do you choose to implement a client Server Network 1 MS DOS 2 Windows 7 3 Windows XP 4 Windows 2003

Last Answer : 4 Windows 2003

Description : Which of the following systems run an application layer firewall using proxy software? 1 Proxy NAT 2 Proxy client 3 Client 32 4 Proxy server

Last Answer : 4 Proxy server

Description : The.... controls a client computer's resources. 1 Application program 2 Instruction set 3 Operating System 4 Server application

Last Answer : 4 Server application

Description : State whether the following statement are true. i) An application-level gateway is often referred to as a proxy. ii) In proxy, a direct connection is established between the client and destination server. A) True, False B) False, True C) True, True D) False, False

Last Answer : A) True, False

Description : While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part.................to the SSL code on the server. A) 420 B) 1032 C) 443 D) 322

Last Answer : C) 443

Description : ............. is a set of information that is exchanged between a client and web browser and a web server during an HTTP transaction. A) infoset B) clientinfo C) cookie D) transkie

Last Answer : C) cookie

Description : State whether true or false. i) Multithreading is useful for application that perform a number of essentially independent tasks that do not be serialized. ii) An example of multithreading is a database server that listens for ... B) i-True, ii-True C) i-False, ii-True D) i-False, ii-False

Last Answer : B) i-True, ii-True