1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
emmainna [20.7K]
4 years ago
6

ImmuneEarth, a research and development company, has "eradicate all diseases" as its motto. It has numerous departments that res

earch the cure of various diseases. One of its largest departments includes the AIDS department where more than 500 scientists constantly research the cure for AIDS. ImmuneEarth has numerous computers that have been grouped into a cohesive system for this purpose. Recently, one of its computers was updated because it had low performance that slowed the entire system. Which of the following is Immune Earth using to research the cure for AIDS? grid computing green computing trusted computing edge computing IP convergence
Computers and Technology
1 answer:
anastassius [24]4 years ago
4 0

Answer:

Grid computing.

Explanation:

Grid computing is a study utilizing Immune Earth to test AIDS treatment because the following are the reasons that describe the answer is true about the scenario.

  • Grid computing seems to be a scattered network with a vast amount for systems linked to handle a difficult issue.
  • Systems can be linked straightly or through organized systems.

Other options are incorrect.

  • Green computing is not the correct answer according to the scenario because the usage of systems and its energy is socially safe and economically sustainable.
  • Trusted Computing is not the correct answer according to the scenario because it helps a part of information to show which os as well as program to be required to access this.
  • Edge computing is not the correct answer according to the scenario because it optimizes web apps as well as software programs while getting computation back to the information base.
You might be interested in
What is an example of bias in media?​
larisa86 [58]
Bias is when the author uses or implements their beliefs into an article, without using factual evidence. An example could be an author saying that apples are bad for you, when really they just don’t like apples.
3 0
3 years ago
The Chief Information Officer (CIO) has determined the company’s new PKI will not use OCSP. The purpose of OCSP still needs to
Step2247 [10]

Answer:

B. Implement a key escrow.

Explanation:

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In this scenario, the Chief Information Officer (CIO) has determined the company's new public key infrastructure (PKI) will not use online certificate status protocol (OCSP). However, the purpose of online certificate status protocol (OCSP) still needs to be addressed. Thus, what should be implemented is a key escrow because the online certificate status protocol (OCSP) is an internet protocol used for maintaining the security of a server and obtaining a digital certificate that has been revoked.

8 0
3 years ago
From the set ( 5 , 7 , 9 , 11 , 13 make the inequality w - 4 < 8 true
Ksenya-84 [330]

Answer:

Explanation:

One group of students did an experiment to study the movement of ocean water. The steps of the experiment are listed below.

Fill a rectangular baking glass dish with water.

Place a plastic bag with ice in the water near the left edge of the dish.

Place a lighted lamp near the left edge of the dish so that its light falls directly on the plastic bag.

Put a few drops of ink in the water.

The student did not observe any circulation of ink in the water as expected because the experiment had a flaw. Which of these statements best describes the flaw in the experiment? (2 points)

Not enough ink was added.

Not enough water was taken.

The dish was too small for the experiment.

The lamp and the ice bag were at the same place.

7 0
4 years ago
Connect research concepts to their definitions
stellarik [79]
Answer Research is defined as the creation of new knowledge and/or the use of existing knowledge in a new and creative way so as to generate new concepts, methodologies and understandings
8 0
2 years ago
Given an array of users, write a function, namesAndRoles that returns all of user's names and roles in a string with each value
LenaWriter [7]

Answer:

def namesAndRoles(users):

   for user in users:

       return f"{user[name]}, {user[role]}"

Explanation:

The python program gets the list of dictionaries of the users in a company and returns the user names and their roles. The code is defined as a function and is executed when the function is called.

3 0
3 years ago
Other questions:
  • Members of which generation were born after the turn of the millennium?
    11·1 answer
  • Write a program that read first a user's given name followed by the user's age from standard input. Then use an ofstream object
    8·1 answer
  • What should you wear during lab investigations to protect your eyes?
    5·1 answer
  • Suppose an application generates chunks of 20 bytes of data every 20 msec, and each chunk gets encapsulated in a TCP segment and
    14·1 answer
  • _____ involves storing data and running applications outside the company’s firewall. answer grid computing parallel computing cl
    11·1 answer
  • What are 3 software programs for mobile computing?
    10·1 answer
  • If a switch needs to send information to other switches in the network it would send out a ___________.
    7·2 answers
  • Chelsea is writing a paper about the value of running every day. She wrote this thesis statement:
    10·1 answer
  • Can someone please tell me what I’m doing wrong ? Please and it’s due on Thursday!!
    10·1 answer
  • Find the name of the professor with the maximum percentage of students that failed his course.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!