1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ki77a [65]
3 years ago
12

Why should cloud computing not be a set of silos? Provide real or made up examples of why incompatible solutions will fail in IT

.?
Computers and Technology
1 answer:
musickatia [10]3 years ago
3 0

Answer:

We need to understand what is a silo, and that is, however, clear from the meaning. It's like some military department has kept a missile in an underground chamber ready to be fired. However, it's more important to understand what it means for a business person. This happens when a department or any management section refuses to share the information they have, the tools, goals, as well as might be in various cases processes with various other departments. This is the silo mentality, and it is believed to have an impact on the operations, and it certainly destroys the morale of the employees and might contribute to the destruction of the concerned company or its culture or might be its product. Now, suppose in an IT company, a certain department registers some sort of threat like in current condition corona. Suppose they do not share this information with their branch in a certain nearby city. Those employees would not benefit from the current information which they can have from that branch, and might not prepare themselves against Corona. An organization level cooperation is required, and that will ensure that the unaffected departments can break the chain, and protect themselves, as well as then send information to all other departments. And currently, this is required to fight against corona at the global level. The whole world should unite, and not let the chain grow. And similarly, various other threats related to IT can be stopped from causing destruction, if departments shed the silo mentality. And incompatibility is never accepted in an IT environment. And the whole world is an IT world now, where we need to share information in between us, so that we keep each safe, growing, and improving. Like in the case of Corona, the whole world must unite and decide to move forward harmoniously, and by God's grace that is what we are doing. And that is an indication, that we will be able to fight successfully against this deadly virus. However, many of us have died. And we should take a lesson from this. The doctors and nurses have done their best to save them, and they have been able to save many out of them. We must say thanks to all of the world’s health organizations/departments for this. And now they have let us know the possible preventive measure, if not the cure. And, while we pay our condolences to all those heavenly souls who are not with us now, and will always be remembered, we must pledge, we will not let more to die, and we will together fight for them. And we are not required to do anything more than staying at home and spending our time with our family. Please be at home, and break the Corona chain by doing that. Also, try staying at least 1 meter apart from each other, and even inside your family. Please follow this, and keep yourself safe by following this, and keep learning. Also, keep yourself sanitized all the time. And doing that, we will win this battle.

Explanation:

Please check the answer section.

You might be interested in
You have received a "no boot device found" notification upon booting your system. what does this mean, and what can you do to tr
zloy xaker [14]
Basically no boot device could be 1 of three things listed below.

1. You have connected an incorrect external device and the system responds to boot from this however no operating system is available. Hence the error. What to do : You have disconnect, reset and select the correct bootable device.
2. You have a faulty hardware specifically your bootable harddisk, corrupted or malfunctioning. You have to reformat and correct the bios installed on the disk.
3. You have not selected correct bootable device. - Select the correct harddisk, if you have partition, be sure to select the one with the Operating system is installed to.
8 0
3 years ago
data is transmitted in plain text. this is a: group of answer choices brute force attack session hijacking dictionary attack cry
Anton [14]

The data that is transmitted in plain text is option D: cryptographic failure.

<h3>An established plain text only assault is what?</h3>

The known-plaintext attack (KPA) is a cryptanalysis assault type where the attacker has access to both the encrypted and plaintext versions of the data (also known as a crib) (ciphertext). These can be used to reveal additional hidden information, including code books and secret keys.

Therefore, Plaintext in the context of cryptography typically refers to unencrypted data that is being prepared for input into cryptographic techniques, typically encryption algorithms. Typically, unencrypted data transmission or storage falls under this category.

Learn more about data transmission from

brainly.com/question/10564419
#SPJ1

5 0
1 year ago
Write a program that reads a book (a file in text format), breaks each line into words, strips whitespace and punctuation from t
diamong [38]

Answer:

Following are the code to this question:

file= open('book.txt') #open file

li= {} #define an empty list

for lines in file: # use for loop Split file data into words

   d= lines.lower().strip(' !?').split() #define variable d that Add it to map

   for val in d: #define loop to store data  

       if val not in li: #check value is not in list

           li[val] = 0 #define list and assign value in 0

       li[val] = li[val] + 1 #Sort the book data and add its value  

m = sorted(li.items(),key = lambda x : -x[1]) #sorted value into the m variable  

print(m[:10]) #print value

Output:

please find the attachment.

Explanation:

In the given python code first, we open the file "book.txt", in next line, an empty list is defined, that uses the for loop which can be described as follows:

  • In the for loop is used, that reads the file data, and defines a variable "d", that stores the values into the map.
  • In the next line another loop is used, that check file values, if values are the same type so, it adds values and writes it.  
  • In the last line, m variable is used, that sorts the values and use the slicing to print its value.

4 0
3 years ago
An individual involved with the aspect of a project will be concerned with budgets and the costs associated with running a busin
Genrish500 [490]
The storming stage of team development is complete when conflicts are resolved and leadership roles are accepted.
6 0
3 years ago
Read 2 more answers
Can someone please answer this for me ? What is data centre virtualization?
castortr0y [4]
Data center virtualization is the process of designing, developing and deploying a data center on virtualization and cloud computing technologies. It primarily enables virtualizing physical servers in a data center facility along with storage, networking and other infrastructure devices and equipment.
3 0
3 years ago
Other questions:
  • What kind of testing is basically checking whether a game or feature works as expected by the developers?
    10·1 answer
  • After clicking the Start button on your computer screen desktop, what option would you then select to examine system components
    6·2 answers
  • In 1988, Robert Morris, Jr. launched a program called the _________ that used weaknesses in e-mail programs and operating system
    5·1 answer
  • According to the Doppler effect, objects moving away from Earth would have a
    12·2 answers
  • A friend of yours started her own dog walking business. At first she only had a couple customers, and she used Word to create al
    8·1 answer
  • SOMEONE PLEASE HELP ME PLEASE HELP ME WITH THIS!!!!!
    14·2 answers
  • ASAP BRAINLIEST!!!!!!
    5·2 answers
  • What is the correct keyboard shortcut to cut a cell value
    15·1 answer
  • Can anyone suggest me any good complete isekai anime..​
    14·2 answers
  • Which cpu type would most likely be found in a smartphone?.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!