1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
____ [38]
2 years ago
7

Difference between centralized and decentralized processing in computer

Computers and Technology
1 answer:
deff fn [24]2 years ago
6 0
Answer:

Centralized computing is analogous to star topology in the networks where there is n entry and n-1 exit points. We see all the computation being carried out by the pivot processor and also embed in itself a decision routine for pass on the message to other linked systems. These systems are merely the mirror whereas the computing is done by the pivot processor.

Decentralized Computing is analogous to distributed node based processing where the topology for interaction among the nodes are random and hence some times there is delay because of the orientation of nodes by since the computation is disperse, it compensates in the time in processing, storage and retrieval.

You can definitely check into IBM and Amazon Research for examples for the Centralized and Decentralized computing.
You might be interested in
How many types of sharing of Google Forms are possible?
scoray [572]

Answer:

Open a form in Google Forms.

In the top right, click More .

Click Add collaborators.

Under "Invite people," type the names or email addresses of the people you want to work with.

Click Send.

8 0
3 years ago
WILL THUMBS UP!!!!!ALL COMMENTS!!!!!!
Mariulka [41]
True

the Articles of Confederation are finally ratified. The Articles were signed by Congress and sent to the individual states for ratification on November 15, 1777, after 16 months of debate. Bickering over land claims between Virginia and Maryland delayed final ratification for almost four more years. Maryland finally approved the Articles on March 1, 1781, affirming the Articles as the outline of the official government of the United States. The nation was guided by the Articles of Confederation until the implementation of the current U.S. Constitution in 1789.
4 0
3 years ago
Which certification does CompTIA recommend a candidate for the CompTIA Network exam already have?
kirill115 [55]

Answer:

normaly a CompTIA A+ and a Cisco CCNA

Explanation:

thses are just some of the basic's i seen comptia list with most network certifications.

3 0
4 years ago
What is the output of the code below assuming that global variable x has value 2 and global y has value 3? def f1(): return "ab"
Lostsunrise [7]

Answer:

ababababab

Explanation:

The code above is written in python and python uses indentation .So let me rephrase the code accordingly and explain what the code really do.

Note x and y is a global variable which can be used by any of the function declared.  According to the question x and y are 2 and 3 respectively

The first block of code describes a function f1 without any argument but the code should return the string "ab"

def f1():

      return "ab"

The second block of code defines a function f2 and returns the value of f1 multiply by x. This means you are multiplying the string "ab" by 2 which will be equals to abab

def f2():

           return f1() * x

The third block of code declared a function f3 and returns the sum of  f2 and product of f1 and y. using PEMDAS principle the multiplication aspect will be solved first so, ab × 3 = ababab, then we add it to f2  . ababab + abab = ababababab.

def f3():

        return f2() + f1() * y

Finally, we print the function f3 value to get ababababab

print(f3())

If you run the code on your IDE like below you will get  ababababab

x = 2

y = 3

def f1():

      return "ab"  

def f2():

      return f1() * x  

def f3():  

      return f2() + f1() * y  

print(f3())

     

7 0
3 years ago
Practice using filters and tables using this document.
mestny [16]

Answer:

Do you still need help?

Explanation:

4 0
3 years ago
Other questions:
  • Earning wise scope of web and mobile app development
    11·1 answer
  • Which osi layer defines the functions of logical network-wide addressing and routing?
    14·1 answer
  • What form of internet access currently uses a technology called 4gb?
    10·1 answer
  • Fill in the function shopSmart(orders,shops) in shopSmart.py, which takes an orderList (like the kind passed in to FruitShop.get
    6·1 answer
  • You can access various sites on the www by using hyberlinks or by
    15·1 answer
  • Encapsulate the following Python code from Section 7.5 in a function called my_sqrt that takes a as a parameter, chooses a start
    7·1 answer
  • 97 points pleaseeee helpppp
    8·2 answers
  • True or False: Nanomemory applies to computers.
    13·1 answer
  • Three materials needed to stream video video content
    10·2 answers
  • Sharon's company has written a new computer program, and she has been asked to find a way to prevent people from copying the sof
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!