I say it is true
hope this helps!
Answer:
Resource Polling is the correct answer to the given question .
Explanation:
The Resource pooling is used in cloud computing frameworks that describe a situation where companies offer temporary and flexible resources to different clients .In the resource polling the programs can be changed to fit the needs of each client without making any adjustments visible to the client.
The main function of resource pooling that it grants a service provider the opportunity to dynamically allocate common physical resources to different clients based on the utilization criteria of each client.
Answer:
Possible if hackers are not so intelligent.
Explanation:
Actually, hackers are intelligent
where they will change location code in different places every second. So end-user who is trying to trace it he or she has to use their intelligence to find the exact location of hackers.
Normally hackers will generate different location places and by using decipher it is possible to find the location codes.
Since hackers used encrypted message we need to decrypts the message and find it out and understand the decrypt and encrypt technology used by hackers.
It is possible to by using decipher to get uncovered locations
The meaning of mesh topology is that it is a type of networking that is made up of the fact that all its nodes do work together to share data amongst each other.
<h3>What is meant by mesh topology?</h3>
Mesh topology is a kind of networking that is said to be where the full nodes do act in a form of a cooperation so that they can be able to share or distribute data among themselves.
Note that this topology was said to be first seen or developed in about an approximate of about 30+ years ago and it is one that is often used in military applications and now it is seen to be used in home automation, smart HVAC control, and others.
Hence, The meaning of mesh topology is that it is a type of networking that is made up of the fact that all its nodes do work together to share data amongst each other.
Learn more about mesh topology from
brainly.com/question/14879489
#SPJ1