1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
madreJ [45]
3 years ago
14

___ involves connecting geographically remote computers into a single network and combining the computational power of all compu

ters on the network. It takes advantage of the the fact that most computers use their central processing units on average only 25 percent of the time, leaving 75 percent of their capacity available for other tasks. A super computer Nanotechnology A workstation Grid computing Green computing
Computers and Technology
1 answer:
insens350 [35]3 years ago
6 0

Answer:

grid computing

Explanation:

<h2><u>Fill in the blanks </u></h2>

<u>grid computing</u>  involves connecting geographically remote computers into a single network and combining the computational power of all computers on the network. It takes advantage of the the fact that most computers use their central processing units on average only 25 percent of the time, leaving 75 percent of their capacity available for other tasks. A super computer Nanotechnology A workstation Grid computing Green computing

You might be interested in
Write down the three part of a computer.<br>​
Nostrana [21]

Answer:

1 system unit 2 monitor 3 keyboard

5 0
3 years ago
While performing maintenance work on the components of a computer, you feel a small electric shock. Before you began working, yo
Colt1911 [192]
Static electricity could have build up because of your clothes
6 0
4 years ago
A meeting of the quality team June is nervous about suggesting ideas because he is not sure he understands why they are qualifie
Flura [38]

Answer: Believe in himself Despite the idea will good or bad

Explanation: We are humans, so he can make a mistake with his ideas, the most important thing for a positive workplace behaviors in the meetings is to show security about your thinking, your ideas also when you are talking, keep in mind that is normal the wrongs and the mistakes, but it is no final you can start again and do it better than the last time, and improve your behavior

3 0
3 years ago
Read 2 more answers
list the six enternal parts or peripherals of a computer system and identify which are output and which are input devices?
inn [45]
There are many peripheral devices but heres 4 external output ones: monitor, speakers, plotter, and printer. Here are also 4 peripheral input devices: mouse, keyboard, mousepad, and joystick.
3 0
4 years ago
Read 2 more answers
Write a program using integers user_num and x as input, and output user_num divided by x three times. Ex: If the input is: 2000
TiliK225 [7]

Answer:

user_num = 2000

x = 2

for i in range(3):

 user_num = user_num // x

 print(user_num)

3 0
3 years ago
Other questions:
  • ________ and wpa are wireless security protocols which use encryption to secure wi_fi networks.
    12·1 answer
  • This is important I need help please
    14·1 answer
  • Write methods to do the following: a. Display three full lines of asterisks on the screen. b. Accept as an argument your name, a
    5·1 answer
  • Define a method named roleOf that takes the name of an actor as an argument and returns that actor's role. If the actor is not i
    11·1 answer
  • Adam has decided to add a table in a Word doc to organize the information better.
    10·1 answer
  • Grading on the curve is a method of grading that is based on the belief that letter grades for any given class should be distrib
    8·1 answer
  • Write three statements to print the first three elements of vector runTimes. Follow each with a newline. Ex: If runTimes = {800,
    8·1 answer
  • Armando is trying to decide how he will alert players that the game is over in the new video game that he is designing. He is co
    8·1 answer
  • A hacker corrupted the name:IP records held on the HOSTS file on a client, to divert traffic for a legitimate domain to a malici
    11·1 answer
  • Write a function to take three integers x, y and n and check if x and y are both fall between 0 to n-1. If yes, your function sh
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!