Peer-to-peer applications __________.

a) distribute responsibilities and functions among peers in the network
b) never rely on a central server
c) require each peer performs client and server functions
d) both a and c


d) both a and c

Computer Science & Information Technology

You might also like to view...

lambda expression represents a(n) ________ method—a shorthand notation for implementing a functional interface.

a. functional b. unnamed c. undesignated d. anonymous

Computer Science & Information Technology

Internet addresses are controlled by which one of the following protocols?

A. TCP B. IP C. UDP D. HTTP (Hypertext Transfer Protocol)

Computer Science & Information Technology

____ exceptions are the type that programmers should anticipate and from which programs should be able to recover.

A. Unchecked B. Runtime C. Checked D. Thrown

Computer Science & Information Technology

Discuss the Postfix master daemon.

What will be an ideal response?

Computer Science & Information Technology