Answers

Answer 1

Answer:

I basically means something like the cloud, where your data is uploaded to servers and is then processed and transferred back to you when you need it.

Explanation:

Hope this helps :)

Answer 2

A de-centrally-powered, fully accessible IT architecture that always enables mobile computer technology as well as internet technologies, is determined as Edge computing.

Processing is done through edge computing, instead of sent off to the server farm, either by the equipment rather than via a localized server computer system.

Examples of edge computing include:

Smart grid excellent analysis.Oilfield rigs security monitoring.Video streaming.Drone-enabled agricultural management.

Learn more about edge computing here:

https://brainly.com/question/22646214

What Is Edge Computing?

Related Questions

Describe Technology class using at least 3 adjectives

Answers

Answer:

clearly alien

typically inept

deadly modern

Explanation:

What exactly is hyperloop, and how does it function?​

Answers

Answer:

The Hyperloop system consists of sealed and partially evacuated tubes, connecting mobility hubs in large metropolitan areas, and pressurized vehicles, usually called pods, which can move at very high speeds, thanks to contactless levitation and propulsion systems as well as to the low aerodynamic drag.

Answer:

https://youtu.be/k-UdTsEpaw0

Explanation:

which is the best monitor and why?​

Answers

Answer:

dksjnejknfkjssjhflkjZfijthajwhj

Explanation:

fjnskjenkjnewkjnfkjs

The volumes of data collected by contemporary organizations are so huge that they are beyond the ability of typical DBMS to capture, store, and analyze. These big data may be unstructured or semi-structured and are not suitable for relational DBMS products. What are the new technologies developed to handle the big data

Answers

Answer:

Some of the new technologies developed to handle the big data are as follows:

1. In-memory Databases

2. Blockchain

3. NoSQL Databases

4. Edge Computing

5. Streaming Analytics.

6. Artificial Intelligence

Explanation:

Some of the new technologies developed to handle the big data are explained as follows:

1. In-memory Databases: This allows for rapid and easy access to data and analytics, which can be used to inform a variety of business choices. In-memory computing provides the information required to improve marketing, finances, and operations efficiency.

2. Blockchain: Blockchain is the distributed database technology that underpins the Bitcoin digital currency, and it's a darling among forward-thinking analysts and venture capitalists. The distinctive feature of a blockchain database is that data can't be erased or changed after it's been written. Furthermore, it is extremely secure, making it a perfect solution for sensitive industries such as retail, insurance, health care, banking, and among others.

3. NoSQL Databases: NoSQL databases are used to store unstructured data and offer quick performance. This implies it can handle a wide range of data formats in high volumes while remaining flexible. MongoDB, Redis, and Cassandra are examples of NoSQL databases.

4. Edge Computing: Edge computing systems evaluate data very near to where it was originated — at the network's edge — rather than sending it to a centralized server for analysis. An edge-computing system has the advantage of minimizing the quantity of data that must be transferred over the network, therefore lowering network traffic and expenses.

5. Streaming Analytics: By analyzing data as it is created, Streaming Analytics allows for faster and faster access to insights. Streaming Analytics can also take data from a variety of sources, evaluate it, and offer insights almost instantly.

6. Artificial Intelligence: Artificial intelligence has the ability to transform data analytics by learning (from previous analytic activities) and improving the speed and accuracy of outputs over time. Artificial intelligence has the ability to make accurate future predictions based on current events with vast amounts of data to draw from, as well as analytic results from previous inquiries.

You manage the DNS servers for the eastsim domain. You have a domain controller named DNS1 running Windows Server 2016 that holds a standard primary zone for the eastsim zone. You would like to configure DNS1 to use forwarders for all unknown zones. You edit the DNS server properties for DNSl. On the forwarders tab, you find that the Use root hints if noforwarders are available option is disabled. You also find you are unable to edit the forwarders list.What should you do?A. Configure root hints on DNSl.B. Change the eastsim.com domain to an Active Directory-integrated zone.C. Enable recursion on DNSl.D. Configure conditional forwarders.

Answers

Answer:

..

Explanation:

...

When my phone powers on does it take away 1 percent of battery?

Answers

Answer:

No, battery is based on your phone activity. Simply turning your phone on will not take away battery percentage.

No turning on your phone does not take up any batteries, your phone battery going go when your phone is used too much-

False
2. Complete the script by filling in the missing parts. The function receives a name, then returns a greeting based on
whether or not that name is "Taylor".
1
2
3
4
def greeting(name):
if
"Taylor":
return "Welcome back Taylor!"
5
6
return "Hello there,
+ name
7
8
print(greeting("Taylor"))
print(greeting("John"))
Run
Reset
3. What's the output of this code if number equals 10?
1
2
3
4
if number > 11:
print(e)
elif number ! - 10:
print(1)
elif number >= 20 or number < 12:
print(2)
else:
print(3)
5
6
7
8

Answers

Answer:

Explanation:

2. #The correct finished code would be the following.

def greeting(name):

  if name == 'Taylor':

      return "Welcome back Taylor!"

  else:

      return "Hello there, " + name

print(greeting("Taylor"))

print(greeting("John"))

3.  The output of this code will be 2 , this is because the second elif statement states that if the number is greater than 20 or less than 12 to print out the value 2. Since the input number is 10 then that is the elif that will be called.

how do computers help us with our homework​

Answers

A computer can be helpful in completing homework because it gives you access to lots of sources of information like graphing websites, calculators, educational games & programs that can help you. It also allows for an easier process to submit work, organize papers, & presentations.

xD I don't know if you said this as a joke, or if you're serious, but here:

A computer can be a helpful tool to complete your homework by giving you access to countless sources of information, it can also provide you with educational games which can enhance a child's learning ability by presenting learning as something fun and interactive as opposed to boring loads of repeated work which barely stimulate learning at all. But keep in mind that a computer can also take the opposite effect on a child's brain, and can gradually turn into addiction.

I hope this helps! :D

(FYI, I spent an unreasonable amount of time typing this all in, so I hope it makes any difference at all :P)

how to get fast frontend development online job as a beginner?​

Answers

Answer:

hmmm well what is your magager?? every job will ask you what you can do.

Azzam is reviewing a paper he just wrote about kinetic friction for his physics class. On the third page, he realizes that every time he wrote "coefficient of friction," he should have written "coefficient of kinetic friction." He uses the Find and Replace tool and clicks on "Replace All" to fix the issue, but then when prints out the paper, he sees "coefficient of friction" in the first paragraph. What is most likely the reason why the phrase was not fixed? Azzam used Find and Replace instead of the Spell Checker. O Azzam clicked "Replace All" instead of "Replace." O Azzam used the tool while he was on the third page. Azzam did not set up the proper printing options.​

Answers

Answer: Azzam used the tool while he was on the third page

Explanation:

The most likely the reason why the phrase was not fixed is because Azzam used the tool while he was on the third page.

This can be infered from the information given when we're told that he uses the Find and Replace tool and clicks on "Replace All" to fix the issue with regards to the error that he made and thus was done from the third page. Therefore, the tool might not have worked for the first page.

If myClass has a constructor with a parameter of type String, select the other constructor that should be included.
a. public void myClass( ) {. . .}
b. public myClass(int value ) {. . .}
c. public myClass(String str1, String str2) {. . .}
d. public myClass( ) {. . .}

Answers

Answer:

d. public myClass( ) {. . .}

Explanation:

A constructor is a special method that is called when an object of a class is created. It is also used to initialize the instance variables of the given class. A class may have one or more constructors provided that these constructors have different signatures. A class that does not have a constructor explicitly defined has a default parameterless constructor.

Having said these about a constructor, a few other things are worth to be noted by a constructor.

i. In Java, a constructor has the same name as the name of its class.

For example, in the given class myClass, the constructor(s) should also have the name myClass.

ii. A constructor does not have a return value. It is therefore wrong to write a constructor like this:

public void myClass(){...}

This makes option a incorrect.

iii. When a constructor with parameters is defined, the default parameterless constructor is overridden. This might break the code if some other parts  of the program depend on this constructor. So it is advisable to always explicitly write the default parameterless constructor.

This makes option d a correct option.

Other options b and c may also be correct but there is no additional information in the question to help establish or justify that.

____________ RAM resides on the processor

Answers

Answer:

Brain of the computer i.e Random Access memory RAM resides on the processor

Explanation:

Brain of the computer i.e Random Access memory RAM resides on the processor. RAM is located in the central processing unit (CPU) also called processor which is located within the motherboard of the computer. It carry out the commands.

Suppose you joined a company that had a WAN composed of SONET, T carrier, and frame relay services, each selected to match a specific network need for a certain set of circuits. Would you say this was a well-designed network

Answers

Answer:

Colts, gan 8 This depends on depends on How suitable the varbus technolog. A axe fol the Applicationd Supporlds Today, increasingly Network...

Please help I I decided to screen shot something in my laptop but now my screen isn’t working or moving can you give me a way to solve my problem this is for 24 points

Answers

Answer:

Just restart it. It would definitely work.

Explanation:

maybe try to do the discharge process?

close your laptop and take off your battery. then press on the power button for atleast 30 seconds or more. now put the battery back on and plug your laptop's charger in. then press power button......i think it'll open by then...I'm not sure tho

investigate the design objective of hybrid computers​

Answers

Explanation:

Hybrid computers are computers that exhibit features of analog computers and digital computers. The digital component normally serves as the controller and provides logical and numerical operations, while the analog component often serves as a solver of differential equations and other mathematically complex equations

Please help it’s timed

Answers

Answer:

archetecture firm

Explanation:

government dont do that,

energy company arent engineers, and manufactures dont do specifically mapping techichian work

Give a name of the part responsible for memorising a cell phone number​

Answers

cerebrum

Explanation:

it controls all voluntary actions and also controls all the higher thought processes such as memory, judgement and reasoning

Suppose a computer using set associative cache has 221 bytes of main memory, and a cache of 64 blocks, where each cache block contains 4 bytes. a) If this cache is 2-way set associative, what is the format of a memory address as seen by the cache, i.e., what are the sizes of the tag, set, and offset fields

Answers

Answer:

Tag = 1

Index = 5

Block offset = 2

Explanation:

From the given information:

The main memory bits(MM) = 221

number of block in the cache = 64 blocks

Block size = 4B

Recall that;

MM = log (memory size)

Thus;

main memory bits = log (221)

= 8 bits

Since this is a 2-way assoicative set;

the number of set in each cache = block size/2

64/2  = 32

Now, the index bit = log( no of set in each cache)

= log(32)

= 5 bits

Also since block size = 4B;

the block offset = log(4) = 2 bits

As such, tag = main memory bits - (index bit + block offset)

tag = 8 -(5 + 2)

tag = 8 -7

tag = 1

What lets you do many things, like write book reports and stories?

Application Programs

Antivirus Software

Email

Duct Tape

Answers

A -
Application programs
application progarms lets you do many things

type of operating system used i handleheld device

Answers

Answer:

6

Explanation:

Palm OSPocketOSSymbianOSLinuxOSWindowsAndroid

For a processor with primary caches only, an instruction cache miss rate of 1%, a data cache miss rate of 5%, a instruction mix of 30% data accesses, and a cache miss penalty of 80 cycles, what will be the contribution to total CPI from the cache misses

Answers

Answer:

2

Explanation:

Instruction cache miss rate = 1% = 0.01

Data cache miss rate = 5% = 0.05

data access Instruction mix = 30% = 0.3

Cache miss penalty = 80 cycles

Determine the contribution to total CPI from the cache misses

Assume cache access time = 1 clock cycle

CpI ( average ) =  1 + (0.01 * 0.7 + 0.05 * 0.3) * 80 = 2.76

∴ contribution to total CPI from cache miss = 2.76 - 0.76 = 2

name the box where the name of the first cell of the selected range appears?
i need help i would be happy if u helped​

Answers

Answer:

Name box

Explanation:

From the picture, the name box is at the top left corner with B1 written inside, here B1 is written because it is the active cell at the time which also happens to be the first cell of the selected range. The name box can be used to easily create a named ranges rather Than having to draw the mouse over a group of cells. It also helps to know which cell is the current active cell as the cell address in the name box is the active cell at any point in time.

There are several types of software development methods, but almost all of them are based on the ________ model.

Answers

Answer:

Waterfall

Explanation:

The waterfall model development strategy may be classed as a flexible design architecture exhibiting a linear operational sequence with each phase being largely dependent on the preceeding phase. Each phase of the waterfall has clearly defined task ; usually starting with the requirement phase where use cases and required docs are gathered, then the design, which caters for the software architecture, the the implementation (which is the main software build) followed by verification and maintainance.

We can see that the waterfall method is sequential and not extremely complex as it follows an entirely linear process.

Write a program to play the Card Guessing Game. Your program must give the user the following choices: 1. Guess only the face value of the card (guessFace() in face.cpp) 2. Guess only the suit of the card (guessSuit() in suit.cpp) 3. Guess both the face value and the suit of the card (guessBoth() in both.cpp) Before the start of the game, create a deck of cards. Before each guess use the function random_shuffle() (

Answers

Answer:

Hey bro I don't know such programs to write but I have number guessing game. Here:

Explanation: Built with python......

import random

while True:

   x = True

   while x:

       num = input("type a limiting number  ")

       if num.isdigit():

           print("lets play")

           num = int(num)

           meow = False

       else:

           print("Invalid input! Try agian.")

   secret = random.randint(1, num)

   guess = None

   count = 1

   while guess != secret:

       guess = input("Please guess a number between 1 and " + str(num) + ":")

       if guess.isdigit():

           guess = int(guess)

       if guess == secret:

           print("You guessed correctly!")

       else:

           print("Oops wrong answer!! Try again..")

           count += 1

   print("it took you", count, "guesses", )

Peter wants to make sure his code is going to work. He has Sally act as the computer mentally checking each step and its results for the entire set of computer instructor. Sally is performing a ________.
A) Inspections
B) Walk-throughs
C) Desk check
D) Unit test

Answers

The answer is B walk throughs

The fact that Sally act as the computer by mentally checking each step means she's performing B. walk throughs.

What is a computer?

A computer simply means an electronic machine that's important to make one's work easier and faster.

In this case, the fact that Sally act as the computer mentally checking each step means she's performing the walk throughs.

Learn more about computer on:

https://brainly.com/question/24540334

Discuss the impact of Python and other open source programming languages on electronic health records and the health care industry. What are the advantages of using open-source programming

Answers

Answer:

Explanation:

Python itself has had an enormous impact on all types of industries including the health care industry. This is mainly due to its ability to easily implement data analysis techniques and artificial intelligence. These combined allow developers to implement artificial intelligence that analyzes large sets of data to pinpoint interesting patterns, which can save lives and detect at-risk individuals using health care records. This is all made possible because it is an open-source language. This means that anyone can use it without having to pay for it. This basically allows anyone to build amazing new features and software without having to worry about gathering the money to pay for licensing fees.

which data type uses %i as a format specifier​

Answers

A decimal integer(detects the base automatically

Select the tasks that would be performed by an information systems graduate.

data mining
forest management
n software design
automotive design
construction planning
mainframe operations
NEXT QUESTION
ASK FOR HELP

Answers

I think data mining and software design.

Answer:

mainframe operations, data mining, software design

Explanation:

g Boolean Algebraic properties _____. a. are used to make boolean expressions more complicated b. are used to convert a Boolean equation to a circuit c. can lead to a simpler expression and thus a simpler circuit d. can be used with integer numbers

Answers

Answer:

c. can lead to a simpler expression and thus a simpler circuit.

Explanation:

Boolean logic refers to a theory of mathematics developed by the prominent British mathematician, called George Boole. In Boolean logic, all variables are either true or false and are denoted by the number "1" or "0" respectively; True = 1 or False = 0.

Also, Boolean logic allow users to combine keywords with Boolean operators (quotes, AND, OR, near/n) to give a more personalized and relevant search results.

There are five (5) main Boolean Algebraic properties and these includes;

I. Commutative property: it applies to both multiplication and addition.

For addition; A + B = B + AFor multiplication; A.B = B.A

II. Associative property: it applies to both multiplication and addition.

For addition; A + (B + C) = (A + B) + CFor multiplication; A(BC) = (AB)C

III. Distributive property: it is formed using the product of a sum.

A(B + C) = AB + AC

IV. Complement property: it involves a variable and its complement.

For addition: A + A' = 1For multiplication; A.A' = 0

V. Identity property:

For addition; A + 0 = AFor multiplication; A.1 = A

In digital electronics, Boolean expressions are used to represent circuits which comprises of Boolean operations and as such simplifying any logic expression without changing or altering any of it's functionalities and properties based on given operations or variables.

Hence, Boolean Algebraic properties can lead to a simpler expression and thus a simpler circuit.

Topic: Graphs.1.) Bob loves foreign languages and wants to plan his courseschedule for the following years. He is interested in the followingnine language courses: LA15, LA16, LA22, LA31, LA32, LA126, LA127,LA141, and LA 169. The course prerequisites are.i.) LA15: (None)ii.) LA16: LA 15iii.) LA22: (None)iv.) LA31:LA 15v.) LA32:LA16, LA31vi.) LA126: LA22, LA32vii.) LA127: LA 16viii.) LA141:LA22, LA 16ix.) LA 169: LA32.Find the sequence of courses that allows Bob to satisfy allthe prerequisites.

Answers

Answer:

  LA15; LA22

LA16; LA31; LA32

  LA169; LA126;

  LA127; LA141

Explanation:

Given

[tex]Courses: LA15,\ LA16,\ LA22,\ LA31,\ LA32,\ LA126,\ LA127,\ LA141,\ LA 169.[/tex]

Required

Course sequence to satisfy the prerequisite

From the course prerequisite, we have:

[tex]1.\ LA15 \to None[/tex]    and    [tex]3.\ LA22 \to None[/tex]

This means that LA15 and LA22 are the base courses, and they have no prerequisite. So, we have:

[tex][LA15; LA22][/tex]

LA16 and LA31 have LA15 as their direct course prerequisite. So, the sequence becomes

[tex][LA15 \to [LA16, LA31]; LA22][/tex]

To complete the sequence, we read each course and place them other their prerequisite.

See attachment for complete tree

From the tree, we have the sequence to be:

LA15; LA22

LA16; LA31; LA32

LA169; LA126;

LA127; LA141

Other Questions
HELPPPP PLEASE QUICK !!!! What is the domain and range of the function y=2* ?Use the graph to help!4-2 pleaseee helpp i have very limited timeee Sofia is moving to a different country. She has always defined her race as African American. What will MOST likely happen when she leaves the United States and moves to a new country Please help solve [tex]\left \{ {{y=-2x+6} \atop {y= x-3}} \right.[/tex] [tex]\left \{ {{y=5x-4} \atop {y=4x+12}} \right.[/tex] [tex]\left \{ {{y=\frac{2}{3}x-4 } \atop {y=-\frac{4}{3}+9 }} \right.[/tex][tex]\left \{ {{4y+7x=6} \atop {4y+7x =-5}} \right.[/tex][tex]\left \{ {{y=0.24x} \atop {y=20.18x+0.9} \right.[/tex][tex]\left \{ {{y=4.5x+15} \atop {y=5x+1.25}} \right.[/tex][tex]\left \{ {{y=3x} \atop {x+y=52} \right.[/tex] 29x-7y=-17 solve for x __________ generally focus on using other people's drug supplies without maintaining a suppply of their own and often waver between the characteristics of chronic types of drug users and experimenter types. Group of answer choices Compulsive users Floaters Regulars Schedule V substances After going on vacation, Mandy came home with $5. She spent $6 on a pair of sunglasses, $10 on snacks, $4 on a book, and $5 on arcade games. How much money did Mandy start with? Which is the correct bond type for a compound of CO2?A. IONICB. COVALENTC. METALLIC.D. NONE OF THE ABOVE Use the correct form or "dar" to complete the sentence. Ellos nos ____la direccin de la fiesta. Base your answer on the information below. The radioisotope uranium-238 occurs naturally in Earth's crust. The disintegration of this radioisotope is the first in a series of spontaneous decays. The sixth decay in this series produces the radioisotope radon-222. The decay of radon-222 produces the radioisotope polonium-218 that has a half- life of 3.04 minutes. Eventually, the stable isotope lead-206 is produced by the alpha decay of an unstable nuclide. Determine the original mass of a sample of Po-218, if 1.50 milligram of the sample remains unchanged after 9.12 minutes Please help!Question: While studying weather and climate this semester, you encountered scientists from different backgrounds with varied talents, interests, and goals. Describe two types of scientists other than a meteorologist interested in this field of study.Whoever have the best answer gets brainliest! Another term for natural radioactive decay into another element is Find the length of the missing side. Bank loans help the economy by __________. A. decreasing the interest rate B. increasing the employment rate C. decreasing the exchange rate D. increasing the money supply Please select the best answer from the choices provided A B C D Electronic instruments developed during what century? A. sixteenth century B. nineteenth century C. twentieth century D. eighteenth century A beam of light hits a mirror at an angel of 35 degrees. What is the angel that it bounces off at? a. 55 degreesb. 35 degreesc. 90 degrees a)Complete this prime factor tree:36b)Write 36 as a product of its prime factors.Write the factors in order, from smallest to largest. Identify and give a brief description of organisation's mission that addressesdiscrimination and human rights violation.(3x2=6) A video uploaded had 54 upvotes if the ratio of up votes to down votes was 9:8 how many down votes did the video get Round your answer to the nearest hundredth find side BC