1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Neporo4naja [7]
2 years ago
10

In what ways are super computer different from mainframe computers.​

Computers and Technology
1 answer:
Ganezh [65]2 years ago
4 0

Answer:

Supercomputers are the specialized and most powerful computer systems that are designed for intense scientific calculations that would be practically impossible for other computers. Mainframes, on the other hand, typically handle a large variety of tasks including data processing, warehousing, and more.

Explanation:

You might be interested in
The device used to control a heating system in the home is called a thermostat.
Makovka662 [10]
<span>The device used to control a heating system in the home is called a thermostat.
This is a true statement.
</span>
3 0
4 years ago
10.( 5) Given the two relations X and Y with relation X has a columns and b rows while relation Y has c columns and d rows then
Vikki [24]

Answer:I DONT KNW THE AWNSER I NEED SOME MONEY SO YA

Explanation:

7 0
3 years ago
What would be the effect of an addition or a deletion of one of the bases in a codon?
Ray Of Light [21]

Answer: When a nucleotide is wrongly inserted or deleted from a codon, the affects can be drastic. Called a frameshift mutation, an insertion or deletion can affect every codon in a particular genetic sequence by throwing the entire three by three codon structure out of whack.

Explanation:

5 0
2 years ago
Why is it important to identify where privacy data resides throughout your it infrastructure?
charle [14.2K]
<span>One of the key elements in reducing the attack surface of an IT enterprise is to determine the location and sensitive nature of all data, especially privacy data which if compromised, could result in litigation, financial loss, or customer confidence loss. Additionally, this information is part of the foundation of when drafting a Disaster Recovery or Business Continuity plan.</span>
7 0
4 years ago
You have a number of Cisco routers and switches that you wish to secure using IPsec. You want IPsec authentication to use digita
aev [14]

Answer:

NDES role service

Explanation:

NDES provides and manages certificates used to authenticate traffic and implement secure network communication with devices that might not otherwise possess valid domain credentials.

3 0
3 years ago
Other questions:
  • Which of the following devices electronically sorts mail by ZIP code?
    11·1 answer
  • Sql provides the ________ technique, which involves placing an inner query within the where or having clause of an outer query.
    8·1 answer
  • ________ is a suite of protocols designed to connect sites securely using ip networks.
    11·2 answers
  • Suppose you want to encode the numerals 0–9 and the 26 letters of the alphabet, using separate codes for lowercase and uppercase
    13·1 answer
  • Convert 42DB5000 base 16 to base 10 floating point form assuming this is a signed floating point encoding (IEEE754) (32-Bit)
    10·1 answer
  • Plz plz plz subsribe to my channel, CookieFunTime
    13·1 answer
  • Benchmark test compare similar systems performing in which tasks
    14·1 answer
  • As a highly flexible structure, __________ can be quickly configured to adapt as required due to changes.
    12·1 answer
  • Frank is preparing a subsection of the SRS document that specifies data formats, data integrity, and storage capabilities. Which
    8·1 answer
  • Question 3 of 25 In computer science, what is a developer? A. A person who organizes all the details of a project B. An individu
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!