1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ki77a [65]
3 years ago
12

Why should cloud computing not be a set of silos? Provide real or made up examples of why incompatible solutions will fail in IT

.?
Computers and Technology
1 answer:
musickatia [10]3 years ago
3 0

Answer:

We need to understand what is a silo, and that is, however, clear from the meaning. It's like some military department has kept a missile in an underground chamber ready to be fired. However, it's more important to understand what it means for a business person. This happens when a department or any management section refuses to share the information they have, the tools, goals, as well as might be in various cases processes with various other departments. This is the silo mentality, and it is believed to have an impact on the operations, and it certainly destroys the morale of the employees and might contribute to the destruction of the concerned company or its culture or might be its product. Now, suppose in an IT company, a certain department registers some sort of threat like in current condition corona. Suppose they do not share this information with their branch in a certain nearby city. Those employees would not benefit from the current information which they can have from that branch, and might not prepare themselves against Corona. An organization level cooperation is required, and that will ensure that the unaffected departments can break the chain, and protect themselves, as well as then send information to all other departments. And currently, this is required to fight against corona at the global level. The whole world should unite, and not let the chain grow. And similarly, various other threats related to IT can be stopped from causing destruction, if departments shed the silo mentality. And incompatibility is never accepted in an IT environment. And the whole world is an IT world now, where we need to share information in between us, so that we keep each safe, growing, and improving. Like in the case of Corona, the whole world must unite and decide to move forward harmoniously, and by God's grace that is what we are doing. And that is an indication, that we will be able to fight successfully against this deadly virus. However, many of us have died. And we should take a lesson from this. The doctors and nurses have done their best to save them, and they have been able to save many out of them. We must say thanks to all of the world’s health organizations/departments for this. And now they have let us know the possible preventive measure, if not the cure. And, while we pay our condolences to all those heavenly souls who are not with us now, and will always be remembered, we must pledge, we will not let more to die, and we will together fight for them. And we are not required to do anything more than staying at home and spending our time with our family. Please be at home, and break the Corona chain by doing that. Also, try staying at least 1 meter apart from each other, and even inside your family. Please follow this, and keep yourself safe by following this, and keep learning. Also, keep yourself sanitized all the time. And doing that, we will win this battle.

Explanation:

Please check the answer section.

You might be interested in
Tại sao xe chỉ sản xuất ra 1996cc mà không phải là 2000cc?
melisa1 [442]

Answer:

hjfkkkjgfyuu7oiuygfffggg

8 0
3 years ago
Read 2 more answers
You modify a document that is saved on your computer. Where are the changes stored until you save the document?a. Radom access m
BartSMP [9]

Answer:

a. Radom Access Memory (RAM).

Explanation:

If a computer user modifies a document that is saved on his or her computer. This changes are stored on the Radom Access Memory (RAM) until the computer user save the document.

Radom Access Memory (RAM) can be defined as the main memory of a computer system which allow users to store commands and data temporarily.

Generally, the Radom Access Memory (RAM) is a volatile memory and as such can only retain data temporarily.

All software applications temporarily stores and retrieves data from a Radom Access Memory (RAM) in computer, this is to ensure that informations are quickly accessible, therefore it supports read and write of files.

3 0
3 years ago
What's the full form of CPU?​
Bas_tet [7]

Answer:

Central processing unit

5 0
3 years ago
Read 2 more answers
Ncomputing and thin client<br>what it is <br>why is done , how it works and how it's <br> done ​
SVEN [57.7K]

The term NComputing  is known to be a form of desktop virtualization company that is said to creates hardware and software to form virtual desktops.

The term Thin clients is known to be virtual desktops. They help a lot of users at the same time to share a single operating system instance.

<h3>What is the aim of a thin client?</h3>

In Ncomputer networking, a thin client is known to be a kind of low-performance computer that is known to be optimized and used for setting up a remote connection.

It is often used with a server-based computing system. The server here is one that often does most of the work, such as launching software programs, etc.

Learn more about Ncomputing from

brainly.com/question/12629145

4 0
2 years ago
Why are there so many problems with drivers?
podryga [215]

D. hope this helped!!!!!

5 0
4 years ago
Other questions:
  • A job application is a form used to make a job request.<br> True<br> False
    8·2 answers
  • Which button, when pressed, allows light from the subject to fall on the sensor?
    8·1 answer
  • In an AND truth table.
    7·1 answer
  • Choose two browsers and compare their security features.
    5·1 answer
  • Henry, a graphic artist, wants to create posters. Which software should Henry use for this purpose?
    13·1 answer
  • According to which virtue do you need to secure information by limiting computer access to authorized personnel only?
    6·1 answer
  • A label control may be added to a form by double-clicking on the Label control icon in the ________ window.
    15·1 answer
  • How to mark a discussion as read on canvas dashboard.
    10·1 answer
  • THIS IS TIMED PLS HURRY UP
    7·1 answer
  • How many bytes/second is a 16Mbps cable modem connection?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!