menu
bartleby
search
close search
Hit Return to see all results
close solutoin list

The client-server model a. is most effective when used as a bus topology, because its deterministic access method avoids collisions and prevents data loss during transmissions. b. is best suited to the token ring topology, because the random-access method this topology uses detects data collisions. c. is more efficient than the bus or ring topologies, because it transmits an entire file of records to the requesting node rather than only a single record. d. distributes both data and processing tasks to the server node. The client-server model can use the bus or ring topology. e. is not used in conjunction with either the bus or ring topology.

BuyFindarrow_forward

Accounting Information Systems

10th Edition
Hall + 1 other
Publisher: Cengage Learning,
ISBN: 9781337619202

Solutions

Chapter
Section
BuyFindarrow_forward

Accounting Information Systems

10th Edition
Hall + 1 other
Publisher: Cengage Learning,
ISBN: 9781337619202
Chapter 12, Problem 9MCQ
Textbook Problem
5 views

The client-server model

  1. a. is most effective when used as a bus topology, because its deterministic access method avoids collisions and prevents data loss during transmissions.
  2. b. is best suited to the token ring topology, because the random-access method this topology uses detects data collisions.
  3. c. is more efficient than the bus or ring topologies, because it transmits an entire file of records to the requesting node rather than only a single record.
  4. d. distributes both data and processing tasks to the server node. The client-server model can use the bus or ring topology.
  5. e. is not used in conjunction with either the bus or ring topology.

To determine

Identify the option which correctly describes the client server model.

Explanation of Solution

Client Server Model:

Client server model is that representation in which a client is in direct contact with the server for transferring data. It is an efficient model as there is no involvement of other nodes.

c.

Client server model is more efficient than bus or ring topologies as there is no involvement of other nodes like transmitting node. Therefore, this option is correct.

a.

Bus topology does not use any server to avoid collision and for prevention of data loss transmission. Bus topology uses token passing mechanism to avoid data loss and collision. Therefore, this option is incorrect.

b.

Token ring topology does not use client server model to detect and avoid collision as all the nodes are equal under client server model and there exists no supervisor server...

Still sussing out bartleby?

Check out a sample textbook solution.

See a sample solution

The Solution to Your Study Problems

Bartleby provides explanations to thousands of textbook problems written by our experts, many with advanced degrees!

Get Started

Chapter 12 Solutions

Accounting Information Systems
Show all chapter solutions
add
Ch. 12 - What is a cookie?Ch. 12 - What is network virtualization?Ch. 12 - Who are the three parties in a smurf attack?Ch. 12 - What is a ping, and how does it work?Ch. 12 - What is a seal of assurance?Ch. 12 - What is a VAN?Ch. 12 - What is a LAN?Ch. 12 - What is a WAN?Ch. 12 - What is a server?Ch. 12 - What are the three classes of cloud computing...Ch. 12 - What is Software-as-a-Service (SaaS)?Ch. 12 - Give two advantages of Infrastructure-as-a-Service...Ch. 12 - What is OSI?Ch. 12 - What purpose do protocols serve?Ch. 12 - Explain the purpose of the two elements of TCP/IP.Ch. 12 - Distinguish between the FTP and TELNET protocols.Ch. 12 - Discuss the three levels of Internet business...Ch. 12 - What is a dynamic virtual organization?Ch. 12 - Give two differences between ASP and SaaS.Ch. 12 - Why is cloud computing not the best option for all...Ch. 12 - What are cookies, and why are they used?Ch. 12 - What security concerns pertain to cookies?Ch. 12 - How does IP spoofing support Internet crime?Ch. 12 - Describe a distributed denial of service (DDoS)...Ch. 12 - What is a digital envelope?Ch. 12 - What is a digital signature?Ch. 12 - What is a digital certificate? How is it different...Ch. 12 - Distinguish between a network-level firewall and...Ch. 12 - What is a certification authority, and what are...Ch. 12 - Discuss the key aspects of the following five...Ch. 12 - Differentiate between a LAN and a WAN. Do you have...Ch. 12 - Explain the purpose of each of the layers in the...Ch. 12 - A DDoS attack a. is more intensive than a DoS...Ch. 12 - A digital signature a. is the encrypted...Ch. 12 - Which of the following statements is correct? a. A...Ch. 12 - Which of the following statements about cookies is...Ch. 12 - A message that is contrived to appear to be coming...Ch. 12 - Which of the following statements is correct? a....Ch. 12 - A Ping signal is a. used to perpetrate URL...Ch. 12 - A system of computers that connects the internal...Ch. 12 - The client-server model a. is most effective when...Ch. 12 - Which statement about Sniffer software is true? a....Ch. 12 - ENCRYPTION The coded message that follows is an...Ch. 12 - CERTIFICATION AUTHORITY LICENSING Research the...Ch. 12 - CLOUD COMPUTING Write an essay on the relative...Ch. 12 - The purchase order for one firm is the source...Ch. 12 - VIRTUALIZATION Virtualization technology is...Ch. 12 - DIGITAL FRAUD In a financial fraud case, city...

Additional Business Textbook Solutions

Find more solutions based on key concepts
Show solutions add
ROE AND ROIC Hilyard Industries net income is 25,000, its interest expense is 5,000, and its tax rate is 40%. I...

Fundamentals of Financial Management, Concise Edition (with Thomson ONE - Business School Edition, 1 term (6 months) Printed Access Card) (MindTap Course List)

What are internal controls designed to do?

College Accounting (Book Only): A Career Approach