1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Olin [163]
1 year ago
10

TO Cloud

Computers and Technology
1 answer:
scoray [572]1 year ago
7 0

The type of situation would it make sense to use edge computing is   where critical decisions must be made on a split-second basis.

<h3>What is edge computing?</h3>

Edge computing is known to be a kind of computing which often occur on site or near a specific data source, it reduces the need for data to be processed in a distance data center.

Note that The type of scenario  that would it make sense to use edge computing is  when critical decisions must be made on a split-second basis as it requires urgency.

Learn more about edge computing from

brainly.com/question/23858023

You might be interested in
Nina is trying to learn more about how computers work. She has repeatedly read that the motherboard is the "brain” of the comput
Lady bird [3.3K]

Its

Processes the data on the computer .

5 0
2 years ago
Read 2 more answers
Calculator and clocks are examples of -------------- in windows 7
Luden [163]
Utilities (not sure)
7 0
2 years ago
DEFINE WHAT COPYRIGHT?
Reika [66]
Copyright is when someone is given the right to print, publish or make a film.
5 0
2 years ago
Read 2 more answers
An organization’s IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
emmasim [6.3K]

Answer:

The correct answer is (a) Remove the affected servers from the network.

Explanation:

Solution:

Now, since the organisation top priority is more of  containment over eradication, an outbreak code that is hostile as an can be suppressed effectively by removing the web server completely from the over all network facilities or infrastructure.

Also, if the affected servers are not removed, it might affect the integrity, confidentiality of sensitive materials or documents which will be exposed to the outside world by the attacker.

4 0
3 years ago
fill in the balenkes ) 1)there are ................................... function keys on the keybord 2)pressing the end key moves
Doss [256]

Answer:

1.) There are 12 function keys 2.) The return Key

Explanation:

6 0
3 years ago
Other questions:
  • The number of bits used to store color information about each pixel is called ____.
    13·1 answer
  • A cast is required in which of the following situations? a. using charAt to take an element of a String and store it in a char b
    7·1 answer
  • You have a large dataset that will print on several pages. You want to ensure that related records print on the same page with c
    11·1 answer
  • 1. What is the main factor that affects Earth’s average temperature?
    12·1 answer
  • Write a Python 3 script in PyCharm that will simulate the game of "Rock, Paper, Scissors": Display a header and the simple rules
    8·1 answer
  • How to cheat on asseeprep
    6·1 answer
  • Write program to read 10 random numbers, then find how many of them accept division by 4,
    6·1 answer
  • Help PLEASE ILL MARK as brainlest
    11·1 answer
  • Class Main {
    11·1 answer
  • Frankie used the ps command to find the process id of an application that he needs to stop. What command-line tool should he use
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!