Programs that ask servers for services are called (a) users (b) hosts -Technology

1 Answer

Answer :

(c) In the client-server model, the client is a piece of hardware/software that ask servers for services.

Related questions

Description : what is the policy (regulations)for FOH (servers, cashiers, hosts etc.) with regards to wearing nail polish?

Last Answer : You should be wearing gloves anyway so it wouldn't matter.

Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.

Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic

Description : ………. is a computer program that provides services to other computer programs. -Technology

Last Answer : Server is a computer program that provides services to other computer programs.

Description : A packet filtering firewall can a. deny certain users from accessing a service b. block worms and viruses from entering the network c. disallow some files from being accessed through FTP d. block some hosts from accessing the network

Last Answer : d. block some hosts from accessing the network

Description : How important is for web servers to be near your users?

Last Answer : Makes absolutely no difference at all if your server is halfway around the world.

Description : Computers that are portable and convenient for users who travel are known as _____ 1) Super computers 2) Lap tops 3) Mini computers 4) File servers 5) None of these

Last Answer : Answer :2

Description : Which statement is true about a cloud computing environment? A. It cannot be used to host location based applications. B. It enables users to access systems regardless of their location. C. It introduces ... D. It can improve a web server response time by having servers closer to the end user.

Last Answer : It enables users to access systems regardless of their location.

Description : The ______ are programs that run on DNS clients and DNS servers and that create queries to extract information from name servers. A. transporter B. distributers C. Resolvers D. both a and b

Last Answer : C. Resolvers

Description : How do I access the "Total DNS" settings for my domain if I changed the name servers?

Last Answer : answer:Your domains are registered through Godaddy correct? When you manage your domain under Nameservers set your name servers back to Godaddy DNS servers (NS17.DOMAINCONTROL.COM, NS18.DOMAINCONTROL.COM) ... server you could, but you would get flooded with requests trying to resolve your domain.

Description : If you have implemented a network where hosts are assigned specific roles such as for file sharing and printing. Other hosts access those resources but do not host services of their own. what type of?

Last Answer : What is the answer ?

Description : What is the difference between web servers and web hosting services?

Last Answer : HostGator makes unlimited Web Hosting easy and affordable with unlimited disk space and bandwidth and an easy control panel. Low prices and easy setup makes HostGator one of the leading web hosting firms in the industry! visit this; cutt.ly/sjVJPll

Description : Which of the following is a service that aggregates servers into an assignable pool? a) VMware vStorage b) VMware vNetwork c) VMware vCompute d) Application services

Last Answer : VMware vCompute

Description : When the content offers interactivity and users can control the progress of the content it is called as (a) Linear multimedia -Technology

Last Answer : (b) Non-linear multimedia uses interactivity to control progress, e.g. video games.

Description : ……….. is a real_time communication between two or more users via computer. -Technology

Last Answer : Chatis a real-time communication between two or more users via computer.

Description : Design View allows users to enter data in the table. -Technology

Last Answer : False Because Design View is used to edit the table design only.

Description : How can text be displayed in place of image for users whose browser do not support images? -Technology

Last Answer : The alt attribute of the tag is used to display the text in place of the image for the users whose browser do not support images.

Description : GUI has become a standard way of how to users interact with a computer? Its one feature is WYSIWYG. -Technology

Last Answer : 1. GUI Graphical User Interface WYSIWYG What You See Is What You Get.2. GUI contains icons that represent files, folders and other applications.

Description : XML uses a DTD to describe its data to users. -Technology

Last Answer : True The DTD are used in XML to specify its information and data to users.

Description : …………. is a type of malware that is installed on a user’s computer and collects information about user without their consent and knowledge. -Technology

Last Answer : Spyware is a type of malware that is installed on a user’s computer and collects information about user without their consent and knowledge.

Description : Information and other resources can be modified only by those users, -Technology

Last Answer : Security and Integrity of information ensures that information and other resources are modified only by those users, who have the authority of making changes in the data.

Description : What are different users’ approach to information? -Technology

Last Answer : The different users’ approach to information are:i. Everyday Approach;ii. Comprehensive or Exhaustive Approach; andiii. Current Approach.

Description : How is the WebOPAC more beneficial to users than the OPAC? -Technology

Last Answer : OPAC (online Public Access Catalogue) is a computerized catalogue of the library resources, available to public for searching online with limitation of boundary and time.However, Web OPAC is an online Public Access ... on the web. It offers the user with 24 * 7 access to the library catalogue.

Description : Why is bibliographical instruction programme meant for advanced users? -Technology

Last Answer : Bibliographic instruction programmes are meant for advance users for serious study. It is a programme of educating users in the systematic use of information resources.It helps the users in taking ... available in particular subject, discipline, and the techniques of making use of those resources.

Description : It allows a visited website to store its own information about a user on the user’s computer. -Technology

Last Answer : (iii) Cookies

Description : Write the Django command to start a new app named ‘users’ in an existing project? -Technology

Last Answer : python manage.py startapp users

Description : __________ app calculate traffic and instruct in order to find the quickest route to user's destination. :- a) Google Music b) Google Maps c) Both a and b D) None of these -Technology

Last Answer : b) Google Maps

Description : The set of programs designed to perform user specific tasks is called application software. -Technology

Last Answer : TrueApplication software refers to the programs that perform operations for a specified task of a user.

Description : Do people over 50 use services like Ask-public?

Last Answer : How do you define older people? Older than you? OK, I'm older than 50. I had an email account when I used to do work on a mainframe before most people heard about email. I designed a web site ... I know that proves nothing. What's your interest in the over 50 crowd and why did you choose that age?

Description : Which of the following provider rely on the virtual machine technology to deliver servers? a) CaaS b) AaaS c) PaaS d) IaaS

Last Answer : IaaS

Description : Which of the following statement is true about virtualization technology? A. Allows manual provisioning of environments. B. Administrationsoftware constantly monitors the software. C. Save energy by powering off the servers. D. Allows automatic deployment of applications.

Last Answer : Allows automatic deployment of applications.

Description : Which of the following provider rely on the virtual machine technology to deliver servers? a) CaaS b) AaaS c) PaaS d) IaaS

Last Answer : IaaS

Description : Which of the following provider rely on the virtual machine technology to deliver servers? a) CaaS b) AaaS c) PaaS d) IaaS

Last Answer : IaaS

Description : Utility programs include (a) Virus scanning software (b) Backup software -Technology

Last Answer : (d) Utility programs includes virus scanning, backup, disk defragmenter software.

Description : For what, Memo data type is used? (a) To add table (b) To store objects created in other programs -Technology

Last Answer : (c) As we know, Memo provides character upto 65536 so, it is used for long text entries.

Description : ………… is a program that mediates between application programs and hardware. -Technology

Last Answer : Operating systemis a program that mediates between application programs and hardware.

Description : The time_sharing operating system allows multiple programs share the computer resources simultaneously. -Technology

Last Answer : TrueIn time-sharing OS, a small amount of time is allocated for the processing simultaneously.

Description : What are the some important programs of Accessories? -Technology

Last Answer : Some important programs of Accessories are as follows:1. Calculator It offers advanced capabilities of a programming, scientific and statistical calculator.2. Text Editor It refers to a simple Word processor ... that is used to create drawings on a blank drawing area or in an existing pictures.

Description : It is used to start programs, obtain help, search for files and folders etc. (a) File menu (b) Edit menu (c) Format menu (d) Start button -Technology

Last Answer : (d) Start button is used to start program, obtain helps, search for files and folders etc and also displays the most commonly used programs in a particular context.

Description : …………. represent graphical representation of various files and programs of an operating system. -Technology

Last Answer : Icons represent graphical representation of various files and programs of an operating system.

Description : …………. represent graphical representation of various files and programs of an operating system. -Technology

Last Answer : Recycle Binrepresent graphical representation of various files and programs of an operating system.

Description : ………….. are desktop icons that links to particular files and programs. -Technology

Last Answer : Shortcutsare desktop icons that links to particular files and programs.

Description : What is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them? -Technology

Last Answer : Antivirus is used to identify, prevent and take action against malicious programs such as viruses and worms, by deactivating or deleting them.

Description : List some commonly available antivirus programs. -Technology

Last Answer : Some of the commonly available antivirus programs in the market are as follows:1. Symantec Norton antivirus2. AVG antivirus3. McAfee scan4. Quick Heal

Description : One limitation of antivirus programs is that they: (a) Sometimes start behaving like virus -Technology

Last Answer : (d) Antivirus can detect only those viruses for which they are programmed.

Description : ……… is a computer program that detects, prevents and takes action to remove malicious software programs. -Technology

Last Answer : Antivirus is a computer program that detects, prevents and takes action to remove malicious software programs.

Description : What is an arrangement made between marketing site that direct users from one site to the other? a) Spam b) Viral marketing c) Affiliate programs d) None of the above

Last Answer : c) Affiliate programs

Description : Which one allow two or more users to run programs at the same time 1) Multiuser 2) Multitasking 3) Multiprocessing 4) None

Last Answer : 1) Multiuser

Description : Which one allow two or more users to run programs at the same time 1 Multiuser 2 Multitasking 3 Multiprocessing 4 None

Last Answer : 1 Multiuser

Description : What is an arrangement made between e‐commerce sites that direct users from one site to the other? a. Spam b. Viral marketing c. Affiliate programs d. None of the above

Last Answer : c. Affiliate programs

Description : A firewall may be implemented in a. routers which connect intranet to internet b. bridges used in an intranet c. expensive modem d. user’s application programs

Last Answer : a. routers which connect intranet to internet