Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
Donate
Ask a Question
What is meant by the term ‘client–server architecture’ and what are the advantages of this approach? Compare the client–server architecture with two other architectures.
+1
vote
212
views
asked
Nov 24, 2021
in
Database Management Systems
by
(user.guest)
Your answer
Help us make this a great place for discussion by always working to provide accurate answers.
Email me at this address if my answer is selected or commented on:
Email me if my answer is selected or commented on
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
Write 2 in words
To avoid this verification in future, please
log in
or
register
.
0
Answers
Related questions
+2
votes
1
answer
607
views
Explain what is meant by the term or phenomenon ‘Register naming’ and show by a sequence of program outline how this is achieved in a computer architecture
asked
Aug 26, 2019
in
Computer Architecture
by
anonymous
+2
votes
1
answer
687
views
What is the fundamental difference between a fat-client and a thin-client approach to client–server systems architectures?
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
1.7k
views
What is the fundamental difference between a fat-client and a thin-client approach to client–server systems architectures?
asked
Nov 23, 2019
in
Software Engineering
by
anonymous
+1
vote
1
answer
1.1k
views
Explain what is meant by “inversion of control” in application frameworks. Explain why this approach could cause problems if you integrated two separate systems that were originally created using the same application framework.
asked
Nov 10, 2019
in
Software Engineering
by
anonymous
+1
vote
0
answers
470
views
The Intel 8085 CPU is one of the many CPUs by Intel. Compare the Intel 8085 CPU with (a) Zilog Z80 CPU (b) Motorolla 6800 CPU in term of architecture, number of instructions, addressing modes and the supporting chips.
asked
Apr 27, 2021
in
Computer Architecture
by
anonymous
+2
votes
1
answer
329
views
What is meant by the term 'a large window of execution is needed’ with reference to superscalar design and processes
asked
Aug 26, 2019
in
Computer Architecture
by
anonymous
+1
vote
1
answer
322
views
What are the different logical layers in an application with a distributed client server architecture
asked
Nov 23, 2021
in
Software Engineering
by
anonymous
+1
vote
1
answer
1.6k
views
Define Network Configuration. What are the various types of the network configuration, explain briefly with neat diagram. Also give the difference between peer to peer and client/server networks?
asked
Aug 26, 2021
in
Computer Networks
by
anonymous
–1
vote
1
answer
1.3k
views
Duplicate: Three missionaries and three cannibals are on one side of a river, along with a boat that can hold one or two people. Find a way to get everyone to the other side, without ever leaving a group of missionaries outnumbered by cannibals.
asked
Aug 7, 2020
in
Artificial Intelligence
by
anonymous
+1
vote
1
answer
851
views
Extreme Programming expresses user requirements as stories with each story written on a card. Discuss the advantages and disadvantages of this approach to requirements description
asked
May 11, 2021
in
Software Engineering
by
anonymous
+1
vote
1
answer
808
views
Extreme programming expresses user requirements as stories, with each story written on a card. Discuss the advantages and disadvantages of this approach to requirements description.
asked
Apr 27, 2021
in
Software Engineering
by
anonymous
+2
votes
1
answer
11.4k
views
Extreme programming expresses user requirements as stories, with each story written on a card. Discuss the advantages and disadvantages of this approach to requirements description.
asked
Oct 31, 2019
in
Software Engineering
by
anonymous
+1
vote
1
answer
1.9k
views
For a P2P file-sharing application, do you agree with the statement, “There is no notion of client and server sides of a communication session”? Why or why not?
asked
Sep 22, 2020
in
Computer Networks
by
(user.guest)
+1
vote
0
answers
283
views
How can standards (the 'what') and other information be used to develop a methodology/approach/framework for managing projects (the 'how')? Describe some of this "other information" that can be used to create a methodology.
asked
Jul 7, 2021
in
Software Engineering
by
anonymous
–1
vote
1
answer
1.9k
views
Duplicate: Suggest two advantages and two disadvantages of the approach to process assessment and improvement that is embodied in the SEI’s Capability Maturity framework.
asked
Sep 14, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
4.3k
views
Give two advantages and two disadvantages of the approach to process assessment and improvement that is embodied in the process improvement frameworks such as the CMMI.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
975
views
What is meant by the term nesting of procedures?
asked
Jan 3, 2020
in
Computer Architecture
by
anonymous
+1
vote
1
answer
237
views
A bag contains 5 red and 4 blue identical balls, if two are selected at random, one after the other, with replacement, find the probability that the first ball is red and the second is blue
asked
Dec 5, 2021
in
Maths & Statistics
by
(user.guest)
+1
vote
1
answer
3.2k
views
What are five components of DBMS environment and their relation with each other?
asked
Sep 22, 2020
in
Database Management Systems
by
(user.guest)
+2
votes
1
answer
8.8k
views
Host Aand B are directly connected with a 100 Mbps link. There is one TCP connection between the two hosts, and Host A is sending to Host B an enormous file over this connection.
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
2.2k
views
What is meant by the term "route aggregation"? Why is it useful for a router to perform route aggregation?
asked
Oct 6, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
476
views
Because of the COVID19, your company decided to let the staff to work from home. However, the senior manager who made this decision is unaware that software is being developed using Scrum. What problems are you likely to encounter using this approach
asked
Jan 14, 2021
in
Software Engineering
by
anonymous
0
votes
1
answer
3.0k
views
What is meant by a control plane that is based on logically centralized control? In such cases, are the data plane and the control plane implemented within the same device or in separate devices? Explain.
asked
Oct 8, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
2.5k
views
What is meant by a control plane that is based on per-router control? In such cases, when we say the network control and data planes are implemented "monolithically." what do we mean?
asked
Oct 8, 2020
in
Computer Networks
by
(user.guest)
0
votes
1
answer
8.2k
views
Suppose Client A initiates a Telnet session with Server S. At about the same time, Client B also initiates a Telnet session with Server S. Provide possible source and destination port numbers for a. The segments sent from A to S.
asked
Sep 26, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
2.1k
views
Give two advantages and two disadvantages of decentralized and semicentralized peer-to-peer architectures.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
356
views
What are some advantages and disadvantages of the CISC architecture
asked
Sep 15, 2021
in
Computer Architecture
by
anonymous
+1
vote
1
answer
533
views
What are some advantages and disadvantages of the RISC architecture
asked
Sep 15, 2021
in
Computer Architecture
by
anonymous
0
votes
1
answer
3.1k
views
What is meant by the "match plus action" operation of a router or switch? In the case of destination-based forwarding packet switch, what is matched and what is the action taken?
asked
Oct 6, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
1.2k
views
Suggest circumstances where it is appropriate to use a fault-tolerant architecture when implementing a software-based control system and explain why this approach is required.
asked
Nov 10, 2019
in
Software Engineering
by
anonymous
+1
vote
1
answer
1.1k
views
In the IBM 360 Models 65 and 75, addresses are staggered in two separate main memory units (e. g., all even-numbered words in one unit and all odd-numbered words in another). Explain what might be the purpose of this technique
asked
Oct 20, 2020
in
Computer Architecture
by
anonymous
+1
vote
1
answer
513
views
Discuss briefly VLIW architecture in computers and state the advantages and disadvantages associated with that technique of design.
asked
Aug 26, 2019
in
Computer Architecture
by
anonymous
+1
vote
1
answer
9.0k
views
Suppose that a Web server runs in Host C on port 80. Suppose this Web server uses persistent connections, and is currently receiving requests from two different Hosts, A and B.
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
+1
vote
1
answer
1.4k
views
Describe briefly by means of a diagram the main difference between multiprocessor and multicomputer design architecture and state two uses of each
asked
Aug 26, 2019
in
Computer Architecture
by
anonymous
+1
vote
0
answers
250
views
Compare and contrast the scrum approach to project management with conventional plan based approaches.
asked
Nov 25, 2021
in
Software Engineering
by
anonymous
+1
vote
1
answer
1.1k
views
By means of a suitable diagram, show Flynn’s classifications of computer architectures for a Single Instruction Stream, Multiple Data stream (SIMD) with Shared and without a Shared memory.
asked
Aug 26, 2019
in
Computer Architecture
by
anonymous
+1
vote
1
answer
419
views
A bag contains fifteen balls distinguishable only by their colours; ten are blue and five are red. I reach into the bag with both hands and pull out two balls (one with each hand) and record their colours.
asked
Sep 20, 2021
in
Maths & Statistics
by
anonymous
+2
votes
1
answer
20.6k
views
The missionaries and cannibals problem is usually stated as follows. Three missionaries and three cannibals are on one side of a river, along with a boat that can hold one or two people.
asked
Oct 2, 2019
in
Artificial Intelligence
by
anonymous
+1
vote
1
answer
1.8k
views
Is it true that there is no client and server sides of a communication session in P2P file sharing
asked
Oct 31, 2019
in
Computer Networks
by
anonymous
+1
vote
1
answer
261
views
While user requirements are expressed as user stories, with each story written on a card. This approach is used in which model?
asked
Dec 16, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
2.1k
views
What is the bit and byte stuffing. Explain this concept with help of neat diagram
asked
Apr 14, 2021
in
Computer Networks
by
anonymous
+2
votes
1
answer
480
views
What is a client program? What is a server program? Does a server program request and receive services from a client program?
asked
Oct 8, 2021
in
Computer Networks
by
anonymous
+3
votes
1
answer
629
views
Duplicate: One approach that is commonly adopted to system testing is to test the system until the testing budget is exhausted and then deliver the system to customers. Discuss the ethics of this approach.
asked
Mar 21, 2020
in
Software Engineering
by
anonymous
0
votes
1
answer
2.3k
views
Besides network-related considerations such as delay, loss, and bandwidth performance, there are other important factors that go into designing a CDN server selection strategy. What are they?
asked
Sep 26, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
234
views
Prove that if the number of Transistors is doubled, the increase in the performance of the processor will be in the region of 40% and discuss the relevance of this mathematical observation to multi-processor computing architecture design.
asked
Aug 26, 2021
in
Computer Architecture
by
anonymous
+1
vote
1
answer
1.2k
views
What are two senses in which the term random-access memory is used?
asked
Dec 29, 2019
in
Computer Architecture
by
anonymous
+1
vote
1
answer
463
views
What's the need for the advent of the multiprocessor design in computer architecture and explain briefly what were the main basis for this shift from the single core development
asked
Aug 26, 2019
in
Computer Architecture
by
anonymous
0
votes
1
answer
1.8k
views
What is meant by an area in an OSPF autonomous system? Why was the concept of an area introduced?
asked
Oct 9, 2020
in
Computer Networks
by
(user.guest)
+2
votes
1
answer
568
views
What is meant by semantic gap in the context of programming languages?
asked
Sep 5, 2020
in
Programming Languages & Algorithms
by
anonymous
+1
vote
1
answer
288
views
What is Wireless NIC. What are the types. Also explain the benefits and what is the network size of this?
asked
Aug 27, 2021
in
Computer Networks
by
anonymous
Welcome to
CPEN
Talk
.com
Solution-oriented students of
computer engineering
on one platform to get you that
ONE SOLUTION
...