FUNDAMENTALS OF COMPUTER

TELECOMMUNICATIONS SYSTEMS

HOW STAR BUS RING MESH TOPOLOGY CONNECT COMPUTER NETWORKS IN ORGANIZATIONS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
In a Peer-To-Peer network, which of the following resources can be considered a client only?
A
local host
B
server
C
workstation
D
none of these
Explanation: 

Detailed explanation-1: -Explanation: Peer-to-peer or P2P software allows individuals to connect to each other over the internet to share files. It doesn’t have a dedicated client-server model. Each node can act as a client and/or a server.

Detailed explanation-2: -In a peer-to-peer network, each client is also the server. If the central machine is not available the service can be provided by any available client or a group of clients each operating as nodes on the network. The peer-to-peer system will find the best clients and will request service from them.

Detailed explanation-3: -In a peer-to-peer network, computers on the network are equal, with each workstation providing access to resources and data. This is a simple type of network where computers are able to communicate with one another and share what is on or attached to their computer with other users.

Detailed explanation-4: -Peer-to-peer network: There is no central server instead each computer can act as a server as well as a client. Each PC is a client and also the server, no central machine is available.

Detailed explanation-5: -Which of the following is not a type of peer-to-peer cyber-crime? Explanation: Phishing, injecting Trojans and worms to individuals comes under peer-to-peer cyber crime. Whereas, leakage of credit card data of a large number of people in deep web comes under computer as weapon cyber-crime. 5.

There is 1 question to complete.