Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Client or Server?

Posted on 2001-06-20
3
Medium Priority
?
198 Views
Last Modified: 2010-04-11
If a executable file (eg. word.exe) is being requested from a server by a client, which side will it be executed or runned? Will the file be transfered to the client and execute there? Or is it execute at the server?
0
Comment
Question by:kianmoon
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 79

Accepted Solution

by:
lrmoore earned 200 total points
ID: 6209951
In a Windows world, it will normally run on the client using the client CPU/memory/disk space, etc.
Unless, the server is a Terminal Server or Citrix server. In that case, the application runs on the server and only the screen runs on the client.
Unix X-Window system is similar to the Terminal Server whereby the application can actually run on the server.
0
 

Expert Comment

by:jaisjoy
ID: 6210336


Exe is copied to client's memory and run there using client machine's resources

0
 

Expert Comment

by:scadaengr
ID: 13358825
its runing on client
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Short answer to this question: there is no effective WiFi manager in iOS devices as seen in Windows WiFi or Macbook OSx WiFi management, but this article will try and provide some amicable solutions to better suite your needs.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses

618 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question