1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Basile [38]
3 years ago
14

Describe data center technology and its relevance to modern-day cloud computing. Support your opinion with cited information.( S

hould be plagarism free )
Computers and Technology
1 answer:
Masteriza [31]3 years ago
6 0

Answer: Data center technologies are the innovations that support the IT(Information technology) department and its functioning like storing data, management, operating etc. Data centers provide the help in functioning of the cloud services.

The modern cloud computing services require data centers for operations protecting data when the the power of the network goes off or any other failure occurs while data is getting updated or accessed.

You might be interested in
Select the components of a search engine.
Assoli18 [71]

Answer:

C because whatever a search engine is it will need a search form to do its job, so C (maybe d)

7 0
4 years ago
Read 2 more answers
Give the type and value of each result of the following Java expressions.
atroni [7]
Give the type and value of each result of the following Java expressions. a. (5 / 2) * 2.0  type is float value is 4.0 b. (5/2.0) * 2 type is integer value is 5c. "1.3" + "5.2" type is string value is 1.35.2d. 1 + 7.0 + "2" + "x"  this will produce an error because we cannot add variables of different type
3 0
3 years ago
If you look at a white object through a glass of any color, it must appear to remain white.
vodomira [7]
False. It will appear the colour of the glass, but just a bit lighter. It’s like looking through floured water or a balloon
4 0
3 years ago
Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and st
natulia [17]

Answer: Geotagging was enabled on her smartphone

Explanation:

The security weakness that is the most likely cause of the security breach is that geotagging was enabled on the vice president's smartphone.

Geotagging, occurs when geographical identification metadata are added to websites, photograph, video, etc. Geotagging can be used to get the location of particular place.

In this case, since geotagging was enabled on her smartphone, it was easy for the attacker to locate her house.

8 0
3 years ago
Code a program that will go through all the numbers from 1 to 100 and print them. However, if the number is evenly divisible by
worty [1.4K]

Answer:

public class Main

{

   // required method

   public static void fizzBuzz(){

       // looping through 1 to 100

       for(int i = 1; i <= 100; i++){

           //if number is evenly divisible by both 3 and 5

           if(i%3 == 0 && i%5 == 0){

               System.out.println("fiz buzz");

           }

                   // if number is divisible by 3

           else if (i%3 == 0){

               System.out.println("fizz");

           }

                        // if number is divisible by 5

           else if (i%5 == 0){

               System.out.println("buzz");

           }

                       // if number is not divisible by both 3 and 5

           else {

               System.out.println(i);

           }

       }

   }

       // main method

       public static void main(String[] args) {

           //calling function

               fizzBuzz();

       }

}

Explanation:

8 0
3 years ago
Other questions:
  • Which quality of service (QoS) mechanism provided by the network does real-time transport protocol (RTP) rely on to guarantee a
    13·1 answer
  • PLEASE HELP
    9·2 answers
  • Without protocols the information sent and received through the Internet would never reach its intended target and even if it di
    6·1 answer
  • witch option in a presentation program contains the formatting and placeholders for all the items that appear on a slide?
    11·2 answers
  • The three activities in an information system that produce the information organizations use to control operations are:a.informa
    9·2 answers
  • The documents created in ms-excel is call what?​
    11·2 answers
  • Write a Java program that generates a new string by concatenating the reversed substrings of even indexes and odd indexes separa
    5·1 answer
  • Natalie is a secretary and must complete a large amount of filing this afternoon. At 1:00 PM, the office receptionist gets sick
    10·1 answer
  • Write a program that will input miles traveled and hours spent in travel. The program will determine miles per hour. This calcul
    5·1 answer
  • Necesito ejemplos de actitud filosófica por favor
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!