13 views
in Computer Engineering by
 ____ is known as a computer network in which one centralized, powerful computer is a hub to which many less powerful personal computers or workstations are connected. The clients run programs and access data that stored on the server. 

a) Client-Server network b) Extranet c) Internet d) None of the above.

1 Answer

0 votes
by

 Client-Server network is known as a computer network in which one centralized, powerful computer is a hub to which many less powerful personal computers or workstations are connected. The clients run programs and access data that stored on the server. 

Related questions

1 answer 27 views

Information that a computer produces and delivers back to the user is known as ____.  a) Input b) Output c) Both (a) and (b) d) None of the above

asked May 13, 2018 in Computer Engineering by Shimroz123
2 answers 29 views

A network which contains one or more than one source of e.m.f. is known as?

asked Mar 25, 2018 in Network Analysis by Shimroz123
1 answer 17 views

Of the following, ____ would be considered as a way through which a computer virus can enter into a computer system.  a) E-mail with attachments b) Downloading the data from sites c) Operating the system without antivirus software d) All of the above

asked May 13, 2018 in Computer Engineering by Shimroz123
1 answer 14 views

In a network, the computer that stores the files and processes the data is named as?  a) Terminal b) Modem c) Server d) None

asked May 13, 2018 in Computer Engineering by Shimroz123
1 answer 15 views

 A computer program that converts one by one instruction into a machine language is called ____.  a) Interpreter b) Simulator c) Compiler d) None of the above

asked May 13, 2018 in Computer Engineering by Shimroz123
1 answer 12 views

 ____ is known as unauthorized access to the system.  a) Decryption b) Encryption c) Hacking d) None of the above

asked May 13, 2018 in Computer Engineering by Shimroz123
1 answer 9 views

____ is known as allowing the authorized access to information.  a) Decryption b) Encryption c) Hacking d) None of the above

asked May 13, 2018 in Computer Engineering by Shimroz123
1 answer 6 views

 ____ is known as restricting the access to information.  a) Decryption b) Encryption c) Hacking d) None of the above

asked May 13, 2018 in Computer Engineering by Shimroz123
1 answer 8 views

Information that is entered into a computer is called as ____.  a) Input b) Output c) Both (a) and (b) d) None of the above

asked May 13, 2018 in Computer Engineering by Shimroz123
1 answer 21 views

The process of a computer receiving information from a server via Internet is known as:  (A) Uploading (B) Retrieving (C) Downloading (D) All of the above

asked May 8, 2018 in Computer Engineering by Zeeshan
1 answer 13 views

 ____ is a set of instructions, also called a program that tells a computer how to perform tasks.  a) Hardware b) Software c) Both (a) and (b) d) None of the above

asked May 13, 2018 in Computer Engineering by Shimroz123
1 answer 20 views

____ is the mode we use to execute the instruction from a computer.  a) Sequential b) Parallel c) Both (a) & (b) d) None of the above

asked May 13, 2018 in Computer Engineering by Shimroz123
1 answer 18 views

If a computer on the network shares resources for others to use, it is called  (1) Server (2) Client (3) Mainframe (4) none 

asked Apr 10, 2018 in Computer Engineering by Shimroz123
1 answer 15 views

Which of the following are known as the short circuit parameters of a 2- port network? (A) Z- parameters. (B) H- parameters. (C) Y- parameters. (D) A,B,C,D, parameters.

asked Apr 28, 2018 in Network Analysis by Shimroz123
0 answers 13 views

The feature which allows user to insert multimedia elements into software programs known as  (1) ODA (2) OLE (3) OMF (4) OSI

asked Apr 10, 2018 in Computer Engineering by Shimroz123
1 answer 18 views

Four bits are used for packet sequence numbering in a sliding window protocol used in computer network. What is maximum window size?  A) 4 B) 8 C) 15 D) 16

asked Apr 11, 2018 in Computer Engineering by Shimroz123
1 answer 15 views

Of the following, ____ is not a computer language. a) MS-Word b) C++ c) COBOL d) BASIC

asked May 13, 2018 in Computer Engineering by Shimroz123
1 answer 13 views

A computer program that converts an entire program into a machine language is called ____.  a) Interpreter b) Simulator c) Compiler d) None of the above

asked May 13, 2018 in Computer Engineering by Shimroz123
1 answer 20 views

An absolutely integrable signal x(t) is known to have a pole at s = 2. Which one of the following is true ? (A) B, C and D are true (B) x(t) can be left-sided (C) x(t) can be right-sided (D) x(t) can be both-sided

asked May 12, 2018 in Control System by Shimroz123
1 answer 17 views

Which of the following is used to design the ICs which are used in Computer System? (A) Silicon (B) Copper (C) Zinc (D) Steel

asked May 13, 2018 in Computer Engineering by Shimroz123
1 answer 22 views

A closed path made by several branches of the network is known as?

asked Mar 25, 2018 in Network Analysis by Shimroz123
1 answer 22 views

Which layer functions as a liaison between user support layers and network support layers?  A) Network layer B) Physical layer C) Transport layer D) Session layer

asked Apr 11, 2018 in Computer Engineering by Shimroz123
1 answer 11 views

The transformer which transforms unbalanced line to a balanced line is better known as  (A) Impedance transformer (B) Amplifier (C) Balun (D) Oscillator

asked May 12, 2018 in Electrical Engineering by Shimroz123
1 answer 24 views

The building block for all information that flows through a computer ____.  a) Bit b) Byte c) Both (a) and (b) d) None of the above

asked May 13, 2018 in Computer Engineering by Shimroz123
1 answer 7 views

What is the shortcut key to display the 'save as' dialog box ____.  a) F8 b) F12 c) F11 d) F9

asked May 13, 2018 in Computer Engineering by Shimroz123
1 answer 18 views

The computer code for interchange of information between terminals is ____.  a) ASCII b) ACSII c) ASICI d) ASIIC

asked May 13, 2018 in Computer Engineering by Shimroz123
1 answer 8 views

 ____ is the language that computer can understand and execute.  a) Middle Level Language b) Machine Level Language c) High Level Language d) All of the above

asked May 13, 2018 in Computer Engineering by Shimroz123
1 answer 21 views

What is meant by devoted computer ____.  a) Which uses only one kind of software b) Which is used by only one person c) Which is assigned with only one task d) No such type of computers are available

asked May 13, 2018 in Computer Engineering by Shimroz123
0 answers 17 views

As compared to the primary memory, the cache memory of the computer is  (1) Large (2) Cheap (3) Fast (4) slow

asked Apr 11, 2018 in Computer Engineering by Shimroz123
1 answer 15 views

A control system in which the control action is somehow dependent on the output is known as?

asked Mar 27, 2018 in Control System by Shimroz123
1 answer 21 views

The property of a material which opposes the creation of magnetic flux in it is known as?

asked Mar 25, 2018 in Electrical Engineering by Shimroz123
0 answers 20 views

The internet standard that allows you to exchange files with other computers on the Internet is known as  (1) HTTP (2) FTP (3) DNS (4) WWW 

asked Apr 11, 2018 in Computer Engineering by Shimroz123
1 answer 17 views

Which of the following devices is used to play computer games with high speed ? (A) Joystick (B) Touch Surface (C) Touch Screen (D) Track ball

asked May 13, 2018 in Computer Engineering by Shimroz123
0 answers 18 views

A critical region  (1) is a piece of code which only one process executes at a time (2) is a region prone to deadlock (3) is a piece of code which only a finite number of processes execute (4) is found only in Windows NT operation system

asked Apr 10, 2018 in Computer Engineering by Shimroz123
0 answers 26 views

A menu driven operating system is one which allows you to pick up from the menu of choices it displays on the screen. What is the name given to the images which are used in such image oriented menus?  (1) Model (2) Figure (3) Symbol (4) Icon 

asked Apr 10, 2018 in Computer Engineering by Shimroz123
1 answer 9 views

A passive network is one which contains?

asked Mar 25, 2018 in Network Analysis by Shimroz123
0 answers 9 views

One of the most powerful tool for dealing with unbalanced polyphase circuit is the method of symmetrical components introduced by the scientist (a) Gauss (b) Volta (c) Newton (d) C.L. Fortescue

asked Apr 14, 2018 in Electrical Engineering by Shimroz123
1 answer 9 views

Which of the following is correct ____.  a) Frequency (data-array, bins array) b) Frequency (data, bins) c) Frequency (data, bins array) d) Frequency (array, bins array)

asked May 13, 2018 in Computer Engineering by Shimroz123
1 answer 13 views

Which of the following is not computer hardware? A. Printer B. CPU C. Monitor D. Antivirus  

asked Apr 12, 2018 in Computer Engineering by Shimroz123
1 answer 10 views

A casting defect which occurs near the ingates as rough lumps on the surface of a casting is known as 1. Shift 2. Sand wash 3. Swell 4. Scab

asked May 17, 2018 in Mechanical Engineering by Shimroz123
0 answers 13 views

Materials having a high dielectric constant, which is non-linear are known as (a) Super dielectrics (b) Elastomers (c) Ferromagnetics (d) Hard dielectrics

asked Apr 14, 2018 in Electrical Engineering by Shimroz123
1 answer 10 views

Computer keyboard can be classified as ________device. A. Memory B. Input C. Output D. Storage

asked Apr 12, 2018 in Computer Engineering by Shimroz123
1 answer 10 views

The smallest unit of computerized data is referred as ____.  a) Bit b) Byte c) Both (a) and (b) d) None of the above

asked May 13, 2018 in Computer Engineering by Shimroz123
1 answer 9 views

The following ____ is termed as permanent memory.  a) Random Access Memory b) Read Only Memory c) Flash Memory d) Cache Memory

asked May 13, 2018 in Computer Engineering by Shimroz123
0 answers 17 views

One of the necessary and sufficient condition for a network function N(s)=p(s)/q(s) to be a transfer function is that  A) The coefficients of the polynomial p(s) and q(s) must be real and those for q(s) must be positive B) Coefficients of p(s) and q(s) must be real and positive C) Coefficients of p(s) must be positive and real but coefficients of q(s) can be negative also D) Degree of p(s) and q(s) may differ by either zero or one only

asked Apr 9, 2018 in Electronics Engineering by Shimroz123
0 answers 13 views

Which if the following operation is the easiest in terms of time as a resource  (1) Accessing an element (2) deletion of an element (3) Insertion of an element (4) creation of Array of given size 

asked Apr 10, 2018 in Computer Engineering by Shimroz123

Welcome to electronics2electrical.com here you can ask questions related to electrical, electronics, mechanical, telecommunication, instrumentation, computer, mathematics, physics etc.
Be respectful to all the members. Do not copy and paste the answers from other websites which have copyright content. While asking question give full details about it.

Categories

Most popular tags

power motor dc circuit transformer voltage current used system phase resistance factor synchronous load ac energy induction electric generator series frequency between speed capacitor use electrical meter line difference control type mosfet transmission magnetic plant high single instrument bjt unit source advantages function diode and machine winding field define torque parallel amplifier supply shunt thyristor motors electricity arduino maximum time relay armature problem value on transformers types coil diagram state flow ratio material three formula starting direction theorem method emf operating efficiency digital wave microprocessor test instruments inductance loss measure operation connected signal low applications effect single-phase network temperature working constant losses different law wattmeter measuring compare controlled breaker drive device logic rc full switch flux wire resistivity disadvantages free of materials machines angle force converter conductor transistor gain open protection scr core measurement number bridge principle generators reactance circuits negative the friction iron loop short pole battery conservation steam resistors hysteresis computer using analog lines secondary station gate a rectifier inverter linear induced relays nuclear capacitance basic characteristics design direct work rotor electronics ammeter forces diesel damping rlc connection factors capacitors minimum insulation moving regulation running self systems air fault range main stability quality starter igbt eddy alternator ideal rl average 3-phase plants arc thermal error fuzzy biasing dielectric pressure balanced superposition errors copper rotation feedback impedance measured electronic electrons charge inductive transfer explain start off back curve over solar is three-phase tariff locomotive peak bias zener engineering commutator surge conductors rating universal potentiometer density permanent mechanical transducer capacity memory adc excitation two fuse pure harmonics application semiconductor inductor internal pmmc reaction welding resonance traction permeability breakers rms designed electromagnetic si generation brushes switching capacitive shaded rate 1 distribution resistor methods delta star oscillator reluctance simplification algebra 8085 boolean weston dynamometer insulating strength installation definition fuel heating earth units
...