expand for answer

Client

A workstation in a network that is set up to use the resources of a server. Individual or process acting on behalf of an individual who makes requests of a guard or dedicated server. The client’s requests to the guard or dedicated server can involve data transfer to, from, or through the guard or dedicated server.


Similar items:
A term used to describe a workstation that has little or no local processing or storage capacity. A thin client is used to connect to and operate a remote system. A workstation with a small amount of processing power and costing less than a fullpowered workstation.
[view]
A method of accessing electronic mail or bulletin board messages that are kept on a (possibly shared) mail server. IMAP permits a “client” email program to access remote message stores as if they were local. For example, email stored on an IMAP server can be manipulated from a desktop computer at home, a workstation at the office, and a notebook computer while traveling, without the need to transfer messages of files back and forth between these computers. IMAP can be regarded as the nextgeneration POP. A protocol used to transfer email messages from an email server to an email client.
[view]
An intelligent code object that performs actions on behalf of a user. It typically takes initial instructions from the user and then carries on its activity in an unattended manner for a predetermined period of time, until certain conditions are met, or for an indefinite period. In the client/server model, the part of the system that performs information preparation and exchange on behalf of a client or server application.
[view]
Peertopeer infrastructure. Often referred to simply as peertopeer, or abbreviated P2P, a type of network in which each workstation has equivalent capabilities and responsibilities. This differs from client/server architectures, in which some computers are dedicated to serving the
[view]
Proxy server is a server that acts as an intermediary between a remote user and the servers that run the desired applications. Typical proxies accept a connection from a user, make a decision as to whether or not client IP address is permitted to use the proxy, perhaps perform additional authentication, and complete a connection to a remote destination on behalf of the user.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in