1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
earnstyle [38]
3 years ago
5

The business case for using grid computing involves all of the following except: speed of computation. cost savings. agility. in

creased computational power. centralized maintenance.
Computers and Technology
1 answer:
mash [69]3 years ago
8 0

Answer:

The solution to this question is given below in explanation section. The correct option is centralized maintenance.

Explanation:

Grid computing  is created to provide specific solution to problems that require to access large amount of data in business.

Grid computing occurs on a network of computing resources managed with advanced forms of middleware, which are called grid services. Grid services provide access control, access to data, security, including digital libraries , and access to large-scale interactive (e.g. server farms) and long-term (digital archives) storage facilities and deep web databases. Grid services are being replaced by open source web services, which perform the same tasks and have been developed over a longer period of time.

The business case for using grid computing involves speed of computation, agility, and increased computational power. However, in business case, grid computing does not involve centralized maintenance.

You might be interested in
What is the critical path?
Natali [406]

Answer:

Option C. The path from start to finish that passes through all the tasks that are critical to completing the project in the shortest amount of time

is the correct answer.

Explanation:

  • Critical path is the term used in Project management.
  • It can be known by determining the longest stretch for dependent activities and the time required for them to complete.
  • A method known as "critical path method" is used for Project modelling.
  • All types of projects including aerospace, software projects, engineering or plant maintenance need Critical method analysis for the modeling of project and estimation.

I hope it will help you!

3 0
3 years ago
Which of the following is an example of a syntax error?
Yuri [45]

Answer:

misspelling a programming language word

Explanation:

Syntax error is the type of error in programming, when the programmer insert some symbol that is not present in directories or libraries, the programmer not followed the rules of that particular programming language that is understandable to compiler.

For example in C++, it is necessary to insert the semicolon (;) after each statement. If the programmer not insert the semicolon after each statement, the program will show the syntax error.

If the programmer use integer instead of int to assign datatype to the variable in C++, it will also leads to the syntax error. Because in C++ library, Integer is defined with the help of "int".

4 0
3 years ago
Capgemini
Setler [38]

Answer:

RPA is completely rule based

3 0
2 years ago
What blank operating system is usually used in personal computers
LenaWriter [7]

The market of personal computers is dominated by Microsoft with their OS called Windows. Windows 10 and Windows 7 are most popular operating systems.

7 0
3 years ago
An administrator needs to protect rive websites with SSL certificates Three of the websites have different domain names, and two
Marysya12 [62]

Answer:

Option A (One SAN certificate) is the right answer.

Explanation:

  • A vulnerability management certificate that permits many domain identities to be safeguarded by such a singular or unique certification, is considered a SAN certificate.
  • Though on the verge of replacing common as well as accepted security credentials with either of these de-facto certifications.

Other alternatives are not connected to the given scenario. Thus the above option is correct.

5 0
3 years ago
Other questions:
  • The number of bits used to store color information about each pixel is called ____.
    13·1 answer
  • Create a class CitiesAndCountries with at least three methods: class CitiesAndCountries: def add_country(self, country_name): ""
    7·1 answer
  • If the polar bear were taken out of the food chain what would happen to the seal population
    10·1 answer
  • On a pie chart, the different sections or "wedges" show:
    9·1 answer
  • The term _______ is used to refer to programs that attackers install after gaining unauthorized access to a system, ensuring tha
    15·1 answer
  • Employers and recruiters rarely use the Internet to search for personal details about applicants.
    9·1 answer
  • Which describes the first step a crawler-based search engine uses to find information?
    10·2 answers
  • When entering a formula into a cell, you begin with are calculations a spreadsheet program applies to data. are preset calculati
    9·1 answer
  • Wiliam would like to sort a list of items after the data is already entered
    7·2 answers
  • _____is detection of events within a given set of parameters, such as within a given time period or outside a given time period.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!