1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
____ [38]
2 years ago
7

Difference between centralized and decentralized processing in computer

Computers and Technology
1 answer:
deff fn [24]2 years ago
6 0
Answer:

Centralized computing is analogous to star topology in the networks where there is n entry and n-1 exit points. We see all the computation being carried out by the pivot processor and also embed in itself a decision routine for pass on the message to other linked systems. These systems are merely the mirror whereas the computing is done by the pivot processor.

Decentralized Computing is analogous to distributed node based processing where the topology for interaction among the nodes are random and hence some times there is delay because of the orientation of nodes by since the computation is disperse, it compensates in the time in processing, storage and retrieval.

You can definitely check into IBM and Amazon Research for examples for the Centralized and Decentralized computing.
You might be interested in
Pls help!!
alexira [117]

Answer:

4.24

Explanation:

First you find the mean of the data set, which is 7. Then to find standard deviation you have to follow the formula which tells you to subtract the mean from each number under the square root : √(2 - 7)^2 + (9 - 7)^2 + (10 - 7)^2 + (4 - 7)^2 + (8 - 7)^2 + (4 - 7)^2 + (12 - 7). Once you solve the parenthesis you square it, once you square it the negatives won't matter. That will leave you with this : √(25 + 4 + 9 + 9 + 25). The formula tells you to find the sum of those numbers (which is 72) then subtract one from how many numbers there are, 5 - 1 = 4, and divide your sum by that number. So 72 / 4 = 18. Then you find the square root of 18 and that becomes your answer.

7 0
2 years ago
When you store files "in the cloud", you are __________.<br><br> I kinda need the answer now
Angelina_Jolie [31]
Putting them online? what are the answers to choose from?
7 0
3 years ago
Write a program that reads an integer and determines and prints whether it's odd or even. [Hint: Use the remainder operator (%).
Sloan [31]
<h2>Explanation:</h2>

The source code, written in Java, and a sample output have been attached to this response. It contains comments explaining certain parts of the code.

A few things to note are;

(i) The Scanner class is imported to allow user's interact with the program. This is done by writing the import statement at the top of the code as follows;

<em>import java.util.Scanner;</em>

<em />

(ii) An object of the Scanner class is created to receive inputs from the user. The object is called input and created as follows;

<em>Scanner input = new Scanner(System.in);</em>

(iii) Since the user is expected to enter an integer, the nextInt() method of the Scanner object is used to receive the integer and this is saved in a variable called <em>number. </em>i.e

<em>int number = input.nextInt();</em>

<em></em>

(iv) A number x, is even if its remainder when divided by 2 is 0. i.e

if x % 2 = 0, then x is even. Otherwise it is odd.

The user's input received and saved in a variable called <em>number </em>is then checked using if and else blocks to check if it is even or not and can be written as follows;

<em>if(number % 2 == 0){</em>

<em>    System.out.println(number + " is even");</em>

<em>}else {</em>

<em>    System.out.println(number + " is odd");</em>

<em>}</em>

4 0
3 years ago
A cloud is an example of
Jlenok [28]
Soft and squishy looking
5 0
3 years ago
Read 2 more answers
While going through the network log, Sarah, a network security administrator, noticed substantial outbound network traffic. Whic
VladimirAG [237]

The activity Sarah, a network security administrator, performed by going through a network log and then noticing substantial outbound network traffic is: indicators of compromise (IOC).

Cybersecurity refers to the preventive practice adopted for the protection of computers, software applications (programs), servers, networks, and data from unauthorized access, attack, potential theft, or damage, through the use;

  • A body of technology.
  • Processes.
  • Frameworks.
  • Policies.
  • Network engineers.

In Cybersecurity, it is very important to adopt certain security standards, policies, frameworks, technology, antivirus utility, and best practices, in order to achieve the following:

I. Prevent data theft and data corruption by malwares (viruses).

II. Enhance data integrity and secure (protect) data.

III. Mitigate any unauthorized access or usage of the system network by a hacker.

In conclusion, the indicators of compromise (IOC) refers to the factual evidence on a network device pointing to a security breach or data theft.

Read more: brainly.com/question/24112967

8 0
3 years ago
Other questions:
  • Which rock band apologized for automatically adding its new album to every iPhone 6 in 2014
    8·2 answers
  • 1) what are two functions of a pick or count condition?
    5·1 answer
  • What can you achieve by selecting Insert in the Table menu?
    7·2 answers
  • Think about the five steps to writing an algorithm. Why is each step necessary? Why is it important to be precise when writing c
    15·1 answer
  • Given that two int variables, total and amount, have been declared, write a loop that reads integers into amount and adds all th
    11·1 answer
  • Help me or I'll go insane I've 6x already I'm about to lose it!!!!
    11·2 answers
  • What framework provides a simple API for performing web tasks?
    13·1 answer
  • Whats wrong with my code for .addEventListener
    11·1 answer
  • HELP ME PLEASE
    14·1 answer
  • Quick I need help ASAP
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!