Solved

Client or Server?

Posted on 2001-06-20
3
191 Views
Last Modified: 2010-04-11
If a executable file (eg. word.exe) is being requested from a server by a client, which side will it be executed or runned? Will the file be transfered to the client and execute there? Or is it execute at the server?
0
Comment
Question by:kianmoon
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 79

Accepted Solution

by:
lrmoore earned 50 total points
ID: 6209951
In a Windows world, it will normally run on the client using the client CPU/memory/disk space, etc.
Unless, the server is a Terminal Server or Citrix server. In that case, the application runs on the server and only the screen runs on the client.
Unix X-Window system is similar to the Terminal Server whereby the application can actually run on the server.
0
 

Expert Comment

by:jaisjoy
ID: 6210336


Exe is copied to client's memory and run there using client machine's resources

0
 

Expert Comment

by:scadaengr
ID: 13358825
its runing on client
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
SSH setup on ASA 5505 17 120
touch pad is jerky on one network works fine on another network 14 70
Websites pages will not open in any browser 7 56
Blocking outside IP Addresses 16 128
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

732 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question