1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naddika [18.5K]
3 years ago
8

Students at a university are working on a project. The project involves many computing systems working together on disjointed ta

sks towards a single goal. What form of computing would the project be using?
A.
mobile computing
B.
grid computing
C.
cloud computing
D.
green computing
Computers and Technology
1 answer:
Natasha_Volkova [10]3 years ago
8 0

Cloud Computing

I hope this helps!

You might be interested in
A(n) ____________ specifies a variable's name and data type.
Alla [95]
I think that would be a function
4 0
3 years ago
Read 2 more answers
I want to be a astrophysicist but my parents want me to be a software engineer. whuch one is better?
Andreas93 [3]
You need to discover yourself which one you love to do. Software Engineering is just science and math, programming languages and too much work, but it’s the job of this era. It’s very very desirable and one of the highest salaries in US.
7 0
3 years ago
Read "Penetration Testing – Reconnaissance with NMAP Tool," located within the required readings. In the article, the authors di
steposvetlana [31]

Answer:

Check the explanation

Explanation:

The two tools that are utilized for consideration in cyber attacks are operating systems and computer systems. The operating system Kali Linux 2.6 3.x Mix (64-bi) and windows XP SPO (32-bit).

Penetration testing is a very important technique or procedure in auditing the loopholes and security in a particular operating system. The computer systems are Nmap and VMware. The author posit that VMware is a virtual machines programming that gives a virtual PC the capacity for more than one event or action of the working frameworks to keep cunning one similar server.

Nmap (“Network Mapper”) according to the authors, it is a free and open source utility for system reviewing and security. these tools are used for the purpose of finding an open port and to also gain access while another considers the vulnerabilities of the operating system.

ALL together these tools assist in building the foundation for ethical hacking. Using Nmap allows a hacker to gain access to the system thereby seeing all the flaws to actively peruse that account. All these tools work together for a successful hacking process and procedures.

5 0
3 years ago
Write a few statements that open a file called "greeting", write the message "hey!" to the file -- and then close it. declare an
pshichka [43]
C++:

int main () {

std::ofstream output {"greeting.txt"};
output << "hey!";
output.close();

return 0;
}
6 0
3 years ago
Read 2 more answers
Why did the editors choose to rearrange the intercutting between Luke’s story and the Imperials? What effect did this have on th
kompoz [17]

Answer:

Though it has its merit, know that the rule is not mandatory. ... A jump cut is a cut in film editing in which two sequential shots of the ... An intercut is a type of edit where two or more actions in distinct ...

3 0
3 years ago
Other questions:
  • What is the term for a male reproductive cell?​
    14·1 answer
  • Which type of cell references are locked and NOT automatically updated when it’s copied
    8·1 answer
  • Select all that apply.
    15·2 answers
  • A top-notch IT company is seeking an experienced leader to direct a team of experts in the development, creation, and modificati
    14·2 answers
  • Which are appropriate uses for special effects in presentations?
    14·1 answer
  • What X coordinate does the center of a game begin at?
    9·1 answer
  • What are the OSHA construction standards also called ?
    10·1 answer
  • What is microsoft certification?
    8·1 answer
  • Write a program that creates a dictionary containing the U.S. states as keys and their abbreviations as values. The program shou
    7·1 answer
  • Julie is purchasing new shoes on a website for her favorite store. Which of the following would indicate that a website is a sec
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!