the thin vs thick client distinction in personal computing hardware involves: group of answer choices physical thickness of the device level of processing size of the disk drives size of the screen

Answers

Answer 1

The primary distinction between the two is that the thin client processes applications using a distant computer. While the thick client runs the programme locally, it handles all of the application processing on its own.

Thin and thick clients: what are they?

Thick clients process information using their own hardware and software, whereas thin clients solely use the software of the primary server for data processing, giving the system the necessary graphical user interface to allow a user to operate.

What distinguishes a thin client from a personal computer?

Computers have a local hard drive that houses programmes and data files. In contrast, thin clients don't have a local hard drive. Instead, these gadgets make use of servers to access programmes.

To know more about applications visit:-

https://brainly.com/question/28650148

#SPJ4


Related Questions

What are users unable to do in the user interface of PowerPoint 2016?

Add additional tabs on the ribbon.
Customize the default tabs on the ribbon.
Fully customize newly added tabs on the ribbon.
Use global options to customize newly added tabs on the ribbon.

Answers

Answer:

B. Customize the default tabs on the ribbon

The other answer is in correct

Explanation:

I took the unit test review and got 100%

edge 2020

it’s customize, just took the test :)

Which of the following IP addresses ranges is reserved for Automatic Private IP Addressing?
a)169.254.0.1 - 169.254.255.254
b)255.255.0.0 169.254.0.0
c)121265594/525
d)None of these

Answers

The IP addresses ranges is reserved for Automatic Private IP AddressingThe correct answer is (a) 169.254.0.1 - 169.254.255.254.

The Automatic Private IP Addressing (APIPA) is a method that enables computers to self-assign IP addresses without the use of a DHCP server. When a computer is not able to obtain an IP address from a DHCP server, APIPA assigns an IP address that is within a reserved range of IP addresses.APIPA automatically assigns the following range of IP addresses:169.254.0.1 – 169.254.255.254.

IP addresses that fall outside the range of APIPA are considered to be valid, global IP addresses, so none of the other options are reserved for Automatic Private IP Addressing.255.255.0.0 169.254.0.0 is an invalid address as it contains a subnet mask and a default gateway.121265594/525 is not a valid IP address as it is not within any of the three classes of IP addresses.Hence, option (a) 169.254.0.1 - 169.254.255.254 is the only range of IP addresses reserved for Automatic Private IP Addressing.

Learn more about IP addresses: https://brainly.com/question/14219853

#SPJ11

1)Which tool can you use to find duplicates in Excel?
Select an answer:
a. Flash Fill
b. VLOOKUP
c. Conditional Formatting
d. Concatenation
2)What does Power Query use to change to what it determines is the appropriate data type?
Select an answer:
a.the headers
b. the first real row of data
c. data in the formula bar
3)Combining the definitions of three words describes a data analyst. What are the three words?
Select an answer:
a. analysis, analyze, and technology
b. data, programs, and analysis
c. analyze, data, and programs
d. data, analysis, and analyze

Answers

The tool that you can use to find duplicates in Excel is c. Conditional Formatting

b. the first real row of datac. analyze, data, and programs

What is Conditional Formatting?

Excel makes use of Conditional Formatting as a means to identify duplicate records. Users can utilize this feature to identify cells or ranges that satisfy specific criteria, like possessing repetitive values, by highlighting them.

Using conditional formatting rules makes it effortless to spot repeated values and set them apart visually from the other information. This function enables users to swiftly identify and handle identical records within their Excel worksheets, useful for activities like data examination and sanitation.

Read more about Conditional Formatting here:

https://brainly.com/question/30652094

#SPJ4

In IBM API, in the management tab can be grouped into_____so that policies can be attached

Answers

The management tab in IBM API allows for grouping into API Products so that policies can be applied.

A set of established guidelines known as an API, or application programming interface, allows various applications to interact with one another.

Companies are able to open their application data and functionality to external third-party developers, business partners, and internal departments within their businesses thanks to this intermediary layer, which handles data transfers between systems.

An API's definitions and protocols enable businesses to connect the numerous applications they use on a daily basis, saving staff time and eradicating the silos that impede creativity and collaboration.

The interface for communication between applications is provided by API documentation for developers, which makes the integration of apps simpler.

To know more about the API visit:

https://brainly.com/question/30812361

#SPJ4

You are troubleshooting a network issue on your server, and suspect the issue exists beyond your gateway / router, in your provider's network. What utility could you use to show routing information between your server and an external remote host?

a. nslookup.

b. ping.

c. tracert.

d. arp.

Answers

The utility that can be used to show routing information between your server and an external remote host is "c. tracert."

The network diagnostic tool "tracert," which stands for "traceroute," is used to follow the route that network packets take from your server to a certain location or remote host.

It shows the IP addresses and routers (hops) in the path, giving details on each hop's latency and response time. You can pinpoint the precise location where network connectivity issues might be occurring by running the tracert program.

Learn more about tracert here:

brainly.com/question/32228465

#SPJ4

The Lexical Protolanguage hypothesis argues that languages began
_____.
1. With words referring to things or events but lacked
grammar
2. As vocal displays signaling mating quality that eventually
evo

Answers

The Lexical Protolanguage hypothesis argues that languages began 1. With words referring to things or events but lacked grammar

What was  Lexical Protolanguage hypothesis ?

A lexical protolanguage presumes, as prerequisites, the capacity and desire for referential communication as well as the ability for vocal imitation  which is needed to build a shared spoken vocabulary.

A language family is thought to have originated from the proto-language, a hypothetical original language from which several documented languages are thought to have descended. Proto-languages are typically unattested or, at most, only slightly attested.

Learn more about languages at;

https://brainly.com/question/10585737

#SPJ1

complete question;

The Lexical Protolanguage hypothesis argues that languages began _____.

1. With words referring to things or events but lacked grammar

2. As vocal displays signaling mating quality that eventually evolved meanings connected to specific syllables.

3. When hominins gained the FOXP2 mutation allowing them to fully produce speech.

4. With gestures referring to things or events combined with some sounds

What is the function of input device?​

Answers

Answer:

The function of an input device is to communicate information to a computer or other sort of information processing equipment. Input devices are types of peripheral devices that communicate with processing units.

9. Which of the following is a disadvantage of cloud storage? * Accessibility (offline/without internet) Reduction of storage cost to organization, Increased possibility for disaster recovery, Efficient management of stored Data​

Answers

Answer:

Accessibility offline

Explanation:

What is the analysis stage in System development life cycle?

Answers

Answer:

Explanation:

end user business requirements are analyzed and project goals converted into the defined system functions that the organization intends to develop. The three primary activities involved in the analysis phase are as follows: Gathering business requirement. Creating process diagrams.

Indirect attacks originate from a compromised system or resource that is malfunctioning or working under the control of a threat. _________________________

Answers

Indirect attacks originate from a compromised system or resource that is malfunctioning or working under the control of a threat is a true statement.

What is compromised system in networking?

A network or system that is known to be compromised is one when  there has been a breach in regards to confidentiality, as well as integrity or presence of its infrastructure or components in any type.

Therefore, based on the above, one can say that Indirect attacks originate from a compromised system or resource that is malfunctioning or working under the control of a threat is a true statement.

Learn more about compromised system from

https://brainly.com/question/28482553

#SPJ1

Indirect attacks originate from a compromised system or resource that is malfunctioning or working under the control of a threat. true or false.

define a function getlength() that takes two parameters passed by reference. the function reads two integers from input as kilometers and meters in this order. the function does not return any value. ex: if the input is 25 800, then the output is: 25 kilometers and 800 meters

Answers

A getlength() function that accepts two reference-passed parameters.

#include<iostream>

using namespace std;

void GetLength(int &usrFeet,int &usrInches)

{

   cin>>usrFeet>>usrInches;

}

int main()

{

   int usrFeet;

   int usrInches;

   GetLength(usrFeet,usrInches);

   cout<<usrFeet<<" feet and "<<usrInches<<" inches" <<endl;

   return 0;

}

What is a parameter?

The values that are passed to a function are designated by parameters. Three parameters might be required for a function, for instance, to add three numbers. There is a name for a function, and other places in a program can call it. A discussion is what results from that information being passed. Functions can typically have a number of parameters in today's programming languages.

Every function parameter has a type, an identifier, and a comma to indicate the break between each parameter and the next. A function's arguments are passed in via the parameters. Every parameter that a function receives when it is called by a program is a variable. The value of each of the resulting arguments is copied into its corresponding parameter in a process call pass by value.

Learn more about parameters

https://brainly.com/question/29555936

#SPJ4

definition of data redundancy​

Answers

Answer:

Data redundancy occurs when the same piece of data exists in multiple places, whereas data inconsistency is when the same data exists in different formats in multiple tables. Unfortunately, data redundancy can cause data inconsistency, which can provide a company with unreliable and/or meaningless information

beta versions do not need to be stored after the production version is released. true or false?

Answers

True, beta versions do not necessarily need to be stored after the production version is released. Beta versions are preliminary releases of a software or product, aimed at allowing a limited number of users to test and provide feedback on its functionality and performance.



Once the production version is finalized and released, it typically incorporates improvements and bug fixes based on feedback from the beta testing phase. In most cases, developers may choose not to store beta versions after the release of the production version, as they are no longer needed for testing purposes. The production version is considered to be the stable and complete version of the software, and users are encouraged to update to this version for optimal performance and security.

However, in some instances, developers might decide to keep the beta versions for historical reference or for troubleshooting purposes in case any issues arise in the production version that might be related to changes made during the beta phase. Nevertheless, this practice is not mandatory, and it depends on the preferences of the development team.

In summary, it is generally true that beta versions do not need to be stored after the production version is released, as the latter is considered to be the refined and stable version of the software, incorporating improvements and fixes from the beta testing process.

Learn more about software here :-

https://brainly.com/question/985406

#SPJ11

Months Write a program that will ask the user for a month as input in numeric format and print out the name of the month. Here is a sample run: Enter the Month: 9 It is september!

Answers

The program prompts the user to enter a month in numeric format and then prints the corresponding name of the month. For example, if the user enters 9, the program will output "It is September!" as the result.

To implement this program in Python, we can define a dictionary that maps numeric month values to their corresponding names. The program will ask the user to input a numeric month value. It will then retrieve the corresponding month name from the dictionary and print it along with a message. Here's an example implementation:

def print_month_name():

   month_dict = {

       1: "January",

       2: "February",

       3: "March",

       4: "April",

       5: "May",

       6: "June",

       7: "July",

       8: "August",

       9: "September",

       10: "October",

       11: "November",

       12: "December"

   }

   month_number = int(input("Enter the Month: "))

   if month_number in month_dict:

       month_name = month_dict[month_number]

       print("It is", month_name + "!")

   else:

       print("Invalid month number.")

print_month_name()

In this program, the dictionary month_dict maps numeric month values (keys) to their corresponding month names (values). The program prompts the user to enter a month number. If the entered number exists as a key in the dictionary, the corresponding month name is retrieved and printed along with the message "It is [month name]!". If the entered number is not found in the dictionary, an error message is displayed.

Learn more about Python here: https://brainly.com/question/30427047

#SPJ11

what is the set of rules that manage how data is sent and received over the internet, in the form of packets?

Answers

The set of rules that manage how data is sent and received over the internet, in the form of packets, is known as the "Internet Protocol Suite" or "TCP/IP" (Transmission Control Protocol/Internet Protocol).

who sang devil went down to georgia

Answers

Answer:

Charlie Daniels sang that one for sure

What is digital divide

Answers

Explanation:

A digital divide is any uneven distribution in the access to, use of, or impact of information and communications technologies between any number of distinct groups, which can be defined based on social, geographical, or geopolitical criteria, or otherwise.

Make a list of eleectric motors in your home​

Answers

The  list of electric motors in my home​ are:

The motor of the fan and that of microwave oven. The motor of the  blender and the refrigerator .

Which motors are used in homes?

The common used one is known to be the Single-phase induction motors and they are known to be used in household applications based on the fact that they have a robust and simple kind of construction and they are known to be  capable for being attached straight to the single-phase grid without the use of power converters.

Hence, The  list of electric motors in my home​ are:

The motor of the fan and that of microwave oven. The motor of the  blender and the refrigerator .

Learn more about electric motors from

https://brainly.com/question/7645396

#SPJ1

If a client does not have the correct DNS server address specified in its TCP/IP properties, what will occur

Answers

Answer:

What capability does the DNS server address provide what would happen if the computer was not configured to use a DNS server?

What would happen if the computer was not configured to use a DNS server? It has name resolution, it creates an association between an IP address and host name. Then no one would have internet.

Thanks for asking me to ask a ques !!

Answers

Answer:

I'm not sure what this means by Hope you have a great day :)

Answer:

An important role to follow when learning is to ask questions.

Since the advent of online writing, our audience:

A. has grown much larger

B. rarely reads what we write

C. has become disinterested

D. usually comprises one person​

Answers

Answer:

C............. I think

Since the advent of online writing, our audience: A. has grown much larger.

Writing refers to an act (process) of using alphabets and writing symbols to communicate ideas, emotions, and thoughts in a readable form.

On a related note, online writing can be defined as a process that involves writing and making a literary work (piece) solely available for an audience over the internet.

Generally, the audience for online writing has grown much larger, as a result of technological advancement and the availability of communication devices such as:

SmartphonesLaptopsPalmtopse-diaries

In conclusion, our audience has grown much larger since the advent of online writing.

Read more on online writing here: https://brainly.com/question/10354868

Arman takes a picture with his smartphone which he subsequently posts online. Beatrice finds the picture online and posts a copy of it on her website with an attached Creative Commons license. Which of the following best describes who owns the photo? A. Beatrice owns the photo because only holders of a Creative Commons license can own works online. B. Arman owns the photo because he was the original creator and did not license the work. C. Arman owns the photo because it was granted a Creative Commons license by another person online. D. Both own the photo because creating a copy makes it her intellectual property.

Answers

Answer:

To me I think it’s B

Explanation:

The best statement that describes who owns the photo is that Arman owns the photo because he was the original creator and did not license the work.

For better understanding, we have to understand why Amman owns the photo and what creative Common license.

Amman own the photo and when he puts it online, he didn't license it but made it free for all to use. That does not mean someone should take His work and use as their own. Creative Commons simply known as the term that summarizes the scope of various outcome that exists between full copyright and the public domain. That is it ranges from all rights reserved to no rights reserved. This type of licenses helps one to have copyright while allowing certain uses of your work and the licenses can stand up in a court of law. Even though Beatrice has the creative license, the photo does not belong to her.

From the above, we can therefore say that the statement of The best statement that describes who owns the photo is that Arman owns the photo because he was the original creator and did not license the work is true.

Learn more about creative license from:

https://brainly.com/question/17082747

Joel needs to write a research paper. What is the best application to use?

Answers

Answer: Britannica High School

Explanation:

https://school-eb-com.content.elibrarymn.org/levels/high

Answer:

g

o

o

g

l

e

s

h

e

e

t

s

Explanation:

Lots of data can be transferred in short time, when we have,
a.High latency
b.Higher bandwidth
c.Lagging
d. Lower bandwidth

Answers

Answer: B. Higher Bandwidth

Thank you lord lord please thank you

System software cannot handle technical details without user intervention.a. Trueb. False

Answers

System software cannot handle technical aspects without user interaction. when a single physical computer runs a specialised programme called virtualization software.

The system software is it used by the user?

Photo of Without user input, system software cannot handle technical details. The components of a computer system's user interface that enable user interaction. A user interface, sometimes referred to as a human-computer interface, is made up of both hardware and software elements. It manages communications between users and the system.

What do you describe a type of computer application that routinely executes additional tasks without user input while running in the background?

A background process is a computer operation that runs automatically without user involvement. These applications frequently handle activities related to logging, system monitoring, scheduling, and user notification.

To know more about system software visit:-

https://brainly.com/question/12908197

#SPJ4

a)to determine the number of aircraft type i processed at period j, formulate the problem as a linear program.

Answers

The problem can be formulated as a linear program by defining decision variables representing the number of aircraft type i processed at period.

In this linear program, let x_ij represent the number of aircraft type i processed at period j. The objective function could be maximizing the total number of aircraft processed, which can be represented as the sum of all x_ij variables. The constraints would include limitations on the total number of aircraft processed in each period, constraints on the availability of resources for processing each type of aircraft, and any other relevant constraints.

The linear program can then be solved using appropriate optimization algorithms to find the optimal values of x_ij that satisfy the constraints and optimize the objective function.

learn more about linear program here:

https://brainly.com/question/30763902

#SPJ11

Why do politically-powerful groups get bigger positive impacts of externalities?

- 1. GOVERNMENT CORRECTION FAVORS THEM
- 2. MORE POWERFUL GROUPS BECAME POWERFUL BECAUSE OF THESE EXTERNALITIES
- 3. BECAUSE OF CORRUPTION AND BRIBERY
- 4. BECAUSE THE POSITIVE IMPACTS ALWAYS OUTWEIGH THE NEGATIVE TO EVERYONE ELSE

Answers

There are a few reasons why politically-powerful groups get bigger positive impacts of externalities. One reason is that government correction favors them. Another reason is that more powerful groups became powerful because of these externalities.

What is government?
An organised community is governed by a system or group of people, typically a state. Government typically consists of the legislative, executive, and judicial branches in the case of its broad associative definition. Government is a mechanism for making policy decisions as well as a way to enforce organisational policies. A declaration of the government's guiding principles and philosophy is the equivalent of a kind of constitution in many nations. The term "government" is frequently used more specifically to refer to the roughly 200 independent national governments as well as subsidiary organisations, even though all organisations have governance. Modern democracies, monarchies, as well as authoritarian as well as totalitarian regimes are the main varieties of political systems.

Yet another reason is because of corruption and bribery. Finally, because the positive impacts always outweigh the negative to everyone else.

To learn more about government
https://brainly.com/question/1078669
#SPJ1

heyyyyyy who likes anime​

heyyyyyy who likes anime

Answers

Answer:

You apparently

Explanation:

Answer:

I don't like anime I love it

Summarize these two up-and-coming leadership positions in digital media: digital media supervisor and chief digital officer (CDO). What does each job entail? What is one way they are different? What is one way they are similar? Which one sounds more appealing to you, and why?

Answers

Answer:

The big differences in the CIO and the Chief Digital Officer is this responsibility for turning IT into a value creator, being a business to the extent of actually having a P&L, which is something that the CIO typically doesn’t have in most organizations.

And so we also see the CDO as something that is really leading digital business from the front in a way that most CIOs aren’t. Most CIOs are not trying to think of new markets, new channels, new business models that the organisation should be getting and making that a top priority. And that’s pretty much all the Chief Digital Officer thinks about is how to take existing assets, existing information, existing knowledge and making a business out of that creating products and services and entering new markets.

I think that the CIO, however, is used to operating much larger operations, so I think what remains to be seen we’re not seeing Chief Digital Officers have as much operational experience, or even necessarily seem to require it. Although I think the really successful digital businesses will be able to scale up their organizations really well, they’re going to have Chief Digital Officers that are good at that, we’re not seeing operational jobs as job number one, quite the same way as we’re seeing it in traditional CIOs.

In terms of really any other big differences, we see that Chief Digital Officers are very multidisciplinary, so they have a lot of different experiences, and there’re very comfortable in talking with marketing and sales in their language. They’re very good at talking to the product teams in their language and operations in their language, and executives and so on. And not to the same degree that we see the CIOs that don’t really talk the language of business, and they talk the language of the IT department but that tends to be it.

Explanation:

Digital Media Supervisor ( CIO )

Chief Digital Officer ( CDO )

The collection of tools for conducting vulnerability assessments and attacks is sometimes referred to as a "____".
a. black box c. gray box
b. white box d. tiger box

Answers

The collection of tools for conducting vulnerability assessments and attacks is sometimes referred to as a d) tiger box.

A tiger box is a comprehensive toolkit that contains various hardware and software tools designed to assist security professionals in identifying, assessing, and exploiting security vulnerabilities in a target system or network. These tools can include scanners, password crackers, exploit frameworks, and other utilities.

Tiger teams, which are groups of ethical hackers or penetration testers, often use these tiger boxes to simulate real-world attacks and assess the security of a system. The goal is to identify vulnerabilities and weaknesses in the system's security measures before malicious hackers can exploit them.

By using a tiger box, security professionals can conduct white box (knowledge of internal system workings), black box (no prior knowledge of the system), and gray box (limited knowledge of the system) testing, depending on the information available and the desired level of thoroughness in the assessment.

Therefore, the correct answer is d. tiger box.

Learn more about security here: https://brainly.com/question/27960062

#SPJ11

Other Questions
Determine the distance between a newly discovered planet and its single moon if the orbital period of the moon is 1.2 Earth days and the mass of the planet it orbits is 9.38E24 kg.You may assume the orbit to be circular. On a july afternoon in florida, the barometric pressure is 29.85 inches and falling. this reading most likely indicates which storm is likely to cause quick destruction along a narrow path? PLEASE HELP FAST I HAVE POSTED THIS QUESTION 3 TIMES!! The extermination of an entire targeted population is called ______. Discrimination scapegoating genocide subjugation. 3. Despite being extremely cold, the moon Europa contains liquid water.True FalseExplanation: Question 2 (5 marks) Clover Bank estimates that its average net daily deposits are $250 million with a standard deviation of $5 million. Clover Bank wants to maintain a minimum of 12% of deposits in reserves at all times. With a 95% confidence level, what is the highest expected level of deposits for Clover Bank? Calculate the amount of reserve does Clover Bank need to maintain. Explain your answers and show all your calculations. which part of our personality contains our partly conscious perceptions, thoughts, judgments, and memories? characteristics of a free market economy Sawyer Industries began business at the start of the current year. The company planned to produce 25,000 units, and actual production conformed to expectations. Sales totaled 22,000 units at $30 each. Costs incurred were: Variable manufacturing overhead per unit $ 8 Fixed manufacturing overhead 150,000 Variable selling and administrative cost per unit 2 Fixed selling and administrative cost 100,000 If there were no variances, the company's absorption-costing income would be: Problemas de razonamiento divisin de nmeros decimales. Ayer Susana se fue de viaje a visitar a unos familiares. Recorri 135,75 km en total, sin hacer ninguna parada en el camino, y tard en llegar a su destino justo 1,5 horas. A qu velocidad media condujo This year you earned $75,500 Laat year you earned $72,400. What was the rate of change on your earnings since last yeara. 4.28%b. 4.68%c. 4.92% d. 5.12% The summary of the game is that there are two players on the board. The board has at a minimum of 15 spaces to ""land on"". They can be circular in nature (think of a monopoly board)Players are collecting CIS classes. A player must have a C or better in three classes to advance to CIS260 (capstone) What was an important difference between native-born americans and some or all of the new immigrants?. The producer es in my food web are abby has become very good at forming complex sentences. she is showing improved use of hope you can read that! will give brainliest ! Qu es los das de los muertos?Contesta en tus propias palabras y en 2 o ms oraciones. Solve this for most Brainly in the third sentence of the fourth paragraph the author mentions the number of swimmers treated by the Spanish Red Cross primarily to