Answer:
Cloud infrastructures support environmental proactivity, powering virtual services rather than physical products and hardware, and cutting down on paper waste, improving energy efficiency, and (given that it allows employees access from anywhere with an internet connection) reducing commuter-related emissions.
Explanation:
Answer:
cloud computing is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.
Advantages of Cloud Computing
Here, we will learn what are the benefits of Cloud Computing in your organization:
Cost Savings
Cost saving is one of the biggest Cloud Computing benefits. It helps you to save substantial capital cost as it does not need any physical hardware investments. Also, you do not need trained personnel to maintain the hardware. The buying and managing of equipment is done by the cloud service provider.
Strategic edge
Cloud computing offers a competitive edge over your competitors. It is one of the best advantages of Cloud services that helps you to access the latest applications any time without spending your time and money on installations.
High Speed
Cloud computing allows you to deploy your service quickly in fewer clicks. This faster deployment allows you to get the resources required for your system within fewer minutes.
Back-up and restore data
Once the data is stored in a Cloud, it is easier to get the back-up and recovery of that, which is otherwise very time taking process on-premise.
Automatic Software Integration
In the cloud, software integration is something that occurs automatically. Therefore, you don't need to take additional efforts to customize and integrate your applications as per your preferences.
Reliability
Reliability is one of the biggest benefits of Cloud hosting. You can always get instantly updated about the changes.
Mobility
Employees who are working on the premises or at the remote locations can easily access all the could services. All they need is an Internet connectivity.
Unlimited storage capacity
The cloud offers almost limitless storage capacity. At any time you can quickly expand your storage capacity with very nominal monthly fees.
Collaboration
The cloud computing platform helps employees who are located in different geographies to collaborate in a highly convenient and secure manner.
Quick Deployment
Last but not least, cloud computing gives you the advantage of rapid deployment. So, when you decide to use the cloud, your entire system can be fully functional in very few minutes. Although, the amount of time taken depends on what kind of technologies are used in your business.
Other Important Benefits of Cloud Computing
Apart from the above, some other Cloud Computing advantages are:
On-Demand Self-service
Multi-tenancy
Offers Resilient Computing
¿Cuál es la ventaja principal de una tabla dinámica?
Explanation:
Ventajas de las tablas dinámicas de Excel:
Hacen que los informes sean flexibles y se adaptan a tus necesidades. Son una forma interactiva de resumir rápidamente grandes volúmenes de datos, haciendo mucho más fácil el proceso de análisis y permitiendo encontrar patrones o tendencias.
what is robotic technology
Answer:
according to britannica :
"Robotics, design, construction, and use of machines (robots) to perform tasks done traditionally by human beings. ... Robots are widely used in such industries as automobile manufacture to perform simple repetitive tasks, and in industries where work must be performed in environments hazardous to humans"
Explanation:
What is a monitor?
i can ask everyone
Answer:
a screen which displays an image generated by a computer.
Explanation:
A monitor is a piece of computer hardware that displays the video and graphics information generated by a connected computer through the computer's video card. Monitors are similar to TVs but usually display information at a much higher resolution. Also unlike televisions, monitors typically sit atop a desk rather than being mounted on a wall.
If an angry person called and demanded to speak with the executive you support, who is currently unavailable, how would you handle it?
Answer: be nice no matter how mean or rude the person is.
Explanation: because if you’re not you can get in big trouble or fired.
Answer:
remain calm during the conversation
write any five main features of fourth generation of computer?
Your help desk has informed you that they received an urgent call from the vice president last night requesting his logon ID and password. You discussed about the call with the VP today and you got to know he never made that call. What type of attack is demonstrated in the given scenario
Answer:
Social Engineering Attack
Explanation:
The exploitation of individuals in order to gain confedential information is a Social Engineering Attack. These attacks typically take advanage of one's emotions or they use inpersonaltion to steal data.
read more here: https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering
Lmk if this helps! :)
Type the correct answer in each box. Spell all words correctly.
Digital artist Frank is discussing how to enhance scanned or photographed images. Complete the following sentences while keeping in mind the topic of discussion.
You can rework or enhance scanned or photographed images using photo editing and illustration software or by using a digital____.
The device has a_____surface on which you can draw images, graphics, and animations.
Answer:
1. Tablet
2. Flat
Explanation:
It is used to select specific menu options, drag and drop options and to draw something on screen.
Answer:
A mouse.
Explanation:
An input device can be defined as any device that is typically used for sending data to a computer system.
Generally, all of the output and input device of a computer are known as peripheral (external) devices and they provide data (informations) to the end users in various formats such as video, audio, texts, images etc.
Since input devices are peripheral (external) devices, they can be connected to the computer system wirelessly or through a wired-connection (cable).
Some examples of peripheral (external) devices are monitor, speakers, keyboard, printer, scanner, projector, mouse, etc.
A mouse is an input device that is designed and used to select specific menu options, drag and drop options and to draw something on screen.
please help me with this this is Computer chapter Advanced HTML of class 8th
Answer:
ok let me try
It stands for
Hypertext Markup Language
Image result for html stands for
HTML (the Hypertext Markup Language) and CSS (Cascading Style Sheets) are two of the core technologies for building Web pages. HTML provides the structure of the page, CSS the (visual and aural) layout, for a variety of devices.
When a class implements in interface, it must ________ Group of answer choices overload all of the methods listed in the interface provide all of the nondefault methods that are listed in the interface, with the exact signatures and return types specified not have a constructor be an abstract class
Answer:
provide all of the nondefault methods that are listed in the interface, with the exact signatures and return types specified
Explanation:
I am assuming the programming language is Java. Actually, none of the answers are 100% correct, but this one is the only one that is partially correct. The reason is the class implementing an interface can be abstract, and in this case it may not provide ALL nondefault methods.
The information included in a résumé should always relate to the job objective; if it isn’t related, it shouldn’t be included.
Answer:
True.
Explanation:
A resume (curriculum vitae) can be defined as a short text-based document that a job applicant use to briefly outline his or her qualifications, abillities and accomplishments, haven completed and obtained an academic certificate. Thus, it is used to briefly outline a person's qualifications, abillities, skills set, and accomplishments, after completing and obtaining an academic certificate such as a bachelor's degree, master's degree, etc.
Generally, all job applicants are required to have a resume (curriculum vitae). This brief and concise document is always requested by human resource managers during the job application process.
Furthermore, the primary way to make a resume persuasive (to convince or inform an action in the minds of the readers - potential employers) is by customizing it to fit each company and position.
Hence, the information included in a résumé should always relate to the job objective; if it isn’t related, it shouldn’t be included.
This ultimately implies that, job applicants are expected to tailor their resume to fit or match the position that is advertised by a company's human resources department.
How is IT used in entertainment to make cartoon movies
Answer:
Forensic animation is a branch of forensics in which animated recreation of incidents are created to aid investigators & help solve cases. Examples include the use of computer animation, stills, and other audio visual aids.
hope you will get this answer correct
When a statement within a try block causes an exception, the remaining statements in the try block Select one: a. are executed after the statements in the catch block b. are executed before the statements in the catch block c. aren't executed
In C++, 'Try block' comprises of a group of statements in which there is a probability of an exception to take place.
C). The statements that would be left in the try block in case a particular statement leads to an exception 'can't be executed.'
In case an exception takes place, the left statements in the try block fail to function. This is the primary reason for which a catch block immediately succeeds a try block in order to deal with the exception and help close that code to allow the statements to work. Thus, option C is the correct answer.Learn more about 'Try block' here:
brainly.com/question/14186450
What is the output of the following C++ code? int list[5] = {0, 5, 10, 15, 20}; int j; for (j = 0; j < 5; j++) cout << list[j] << " "; cout << endl; Group of answer choices 0 1 2 3 4 0 5 10 15 0 5 10 15 20 5 10 15 20
Answer:
what?
Explanation:
Which of these is an example of an IT career? (ik I'm trash at this kinda stuff)
Select all that apply
A
game designer
B
network engineer
C
graphic designer
D
cashier
Answer:
not d
Explanation:
IT is info tech, so it's most likly a or c(I'mma go witn c), but then again b is possible, but c still sounds most reasonable(I think)
4) Programming a) WAp to find the greatest number among any three numbers.
def comp_num (num1, num2, num3):
try:
if num1 > num2 and num1 > num3:
print ( "{0} is the biggest".format(num1) )
elif num2 > num1 and num2 > num3:
print ( "{0} is the biggest".format(num2))
elif num3 > num2 and num3 > num1:
print ( "{0} is the biggest".format(num3))
except ValueError:
return "Invalid input"
num_1 = int (input (" Please enter a number: "))
num_2 = int (input (" Please enter a second number: "))
num_3 = int (input (" Please enter a third number: "))
print (comp_num (num_1, num_2, num_3))
Answer:
this is in qbasic programming
You are the security analyst for your organization. Clients are complaining about being unable to connect to the wireless network. After looking into the issue, you have noticed short bursts of high-intensity RF signals are interfering with your wireless network's signal. Which type of attack are you most likely experiencing
Explanation:
denial of service attacks (dos)
Based on the above, the kind of attack the person is most likely experiencing is known as jamming.
What is Electronic jamming?This is known to be a kind of electronic warfare that is the use of jammers that shows interfering signals toward an enemy's system and thus it often blocks the receiver.
Therefore, Based on the above, the kind of attack the person is most likely experiencing is known as jamming.
Learn more about jamming from
https://brainly.com/question/17488276
#SPJ9
what do you mean by automation and diligence with respect to a computer??
Answer:
Delegince computer without any motion resists
What impact, if any, have advances in technology had on people’s ability to communicate through media? Advances in technology have had no measurable impact on people’s ability to communicate through media. Advances in technology have made it more difficult for people to communicate through media. Advances in technology have made it easier for people to communicate through media. Advances in technology have had made it both easier and more difficult to communicate through media.
Answer:
What impact, if any, have advances in technology had on people's ability to communicate through media? Advances in technology have made it easier for people to communicate through media.
Answer:
advances in technology made it easier for ppl to communicate through media
Explanation:
because i got it right
c) Explain GIGO briefly.
Answer:
Is is also a computer science acronym that implies bad input will result in bad output. Requiring valid input also helps programs avoid errors that can cause crashes and other erratic behavior.
IT'S FORMULA IS GIGO: GARBAGE IN GARBAGE OUT...
HOPE IT'S HELPFUL FOR U!!
AND PLZ MARK ME AS BRAINLIEST IF U LIKE THIS ANSWER!!!!
how do I answer question
Answer:
To answer a question on brainly, there is a add answer button below the question. Please look at the attached, it shows you the add answer button.
Explanation:
Once you click on add answer, brainly will take you to something that looks like a note and all you have to do is type the answer and explanation. Once you do that, click on the add your answer button on the top right corner, and your answer will be posted.
What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any program designed to do harm a type of software designed to track activity online
a malware is any program designed to do harm
Explanation:
a malware (malicious software) is any software intentionally designed to cause damage to a computer,server, client or computer network.
What is the output?
>>> password = "sdf345"
>>> password isalpha()
>>>
Explanation:
the output password is isalpha()
write a program in python to make the figure:-
*
**
****
********
****************
********************************
The first and correct answer will be marked as brainliest......
Answer:
Halo mateeeee
look it will be hard to explain the code and steps to you so just refer this video. .
it will help a lott
( *cries* Serena left Ash In pokemon s19 with a k I s s)
https://youtu.be/rUy_Nq9DHTs
Which of these would you use to connect a mouse to a computer?
O RAM
O ROM
O USB
O TOT
c programming question
Given n, take the sum of the digits of n. If that value has more than one digit, continue reducing in this way until a single-digit number is produced. The input will be a non-negative integer.
Answer:
int digitSum(int n) {
int sum = 0;
while (n) {
sum += n % 10;
n /= 10;
}
return sum < 10 ? sum : digitSum(sum);
}
int main()
{
int n = 12345;
printf("Digit sum of %d is %d\n", n, digitSum(n));
}
Explanation:
The recursion takes care of the repeated summing in case the sum has more than 1 digit.
Bruce frequently works with a large number of files. He is noticing that the larger the files get, the longer it takes to access them. He suspects that the problem is related to the files being spread over the disk. What utility can be used to store the files contiguously on the disk
The utility that could be stored for the files is disk defragmenter.
The following information related to the disk defragmenter is:
In the case when the program saved the file on the disk so here the file should be put onto the empty space. It considered all the parts & pieces on each and every file and the same should be stored in one place.Also, the programs should be kept in one place, and the space that is not used should be on the hard disk.Therefore we can conclude that The utility that could be stored for the files is disk defragmenter.
Learn more about the disk here: brainly.com/question/12656426
What is a single physical processor? plz help
Answer:
A physical processor which is also referred to as a CPU, is a chip that is visible on a computer's circuit board.
Explanation:
How to execute python code in command prompt *window*?
Iam using sublime text 3 and want to execute my python code in command prompt.
This is my current build system:
{
"cmd": ["python", "$file"],
"selector": "source.python",
"file_regex": "^\\s*File \"(...*?)\", line ([0-9]*)"
}
But I want my program to open in command prompt window and show the result there. I dont want to see the result in sublime text. Please help.
Answer:
Open Command Prompt and type “python” and hit enter. You will see a python version and now you can run your program there
A transition is ________.
Answer:
the process or a period of changing from one state or condition to another.
Explanation:
"students in transition from one programme to another"