1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Simora [160]
3 years ago
12

QUESTIONS Which of the following use cases are suitable for compute-optimized cloud offering? ОА. None of the listed O B. Highly

Scalable Multiplayer Gaming OC. Distributed Analytics O D. Scientific Modelling O E. All of the listed ​
Computers and Technology
1 answer:
Ede4ka [16]3 years ago
4 0

Answer:

E. All of the listed ​

Explanation:

For compute-optimized cloud offerings like AWS, suitable use cases are - gaming, distributed analytics, and scientific modeling. Since all these are suitable, the correct answer is E.

You might be interested in
How important "saving" in every individual?​
photoshop1234 [79]

Answer:

The importance of saving money is simple: It allows you to enjoy greater security in your life. If you have cash set aside for emergencies, you have a fallback should something unexpected happen. And, if you have savings set aside for discretionary expenses, you may be able to take risks or try new things.

4 0
3 years ago
Processing information involves ____.a. Performing arithmetic or logical operations on binary data accepting information from th
Iteru [2.4K]

Answer:

c. Both a and b

Explanation:

In computing, processing information simply means performing a task. It means transforming data from one form to another.

In the real sense of it, it means, performing arithmetic or logical operations (by ALU) on binary data which could result in transmitting data from input devices to output devices. When a user launches the calculator application on his PC, and he tries to do some arithmetic (which is processed by the ALU) by entering numbers using his keyboard/mouse (input devices), he gets the result on the screen(output device). This scenario is a typical example of processing information.

<em>Hope this helps!</em>

7 0
3 years ago
Please
Andrew [12]

Answer:

C. 2^16

Explanation:

In Computer Networking, there are five (5) classes of IP addresses, these include;

- Class A

- Class B

- Class C

- Class D

- Class E

The various classes of IP address are represented by the value of their first octet. The first octet value of Class B is 128-191 with a subnet mask of 16.

Hence, from the IP address 149.130.x.y where x and y are 8-bit numbers. The x and y equals 16-bit numbers.

Thus, 2^16 devices can connect to the Wellesley network before we run out of IP addresses.

3 0
3 years ago
What justification can you give for normalizing a database if the database will be updated only by the people who can be trusted
kakasveta [241]

Answer: C) Both a and b

Explanation:

 The main benefit of normalizing the database as it reduced the redundant data and due the lack of the redundant data, it saves lots of space in the database.

It also improve the update time in the database so it is easy to handle the database security in the system.

It is also has ability to store the dangling tuples so it can easily store all the information of the customer without introduce any inconsistencies in the database system.

Therefore, Option (C) is correct.

 

3 0
3 years ago
List inputs to a technological system
Basile [38]

The seven inputs to a technological system are people, materials, tools and machines, energy, information, finances, and time.

4 0
4 years ago
Other questions:
  • Given a int variable named yesCount and another int variable named noCount and an int variable named response write the necessar
    6·1 answer
  • What percent of the internet is the deep web?
    14·1 answer
  • Which types of computers are used by large businesses
    10·1 answer
  • 12) If the image's name is filename.gif, how can I make this image the background of my page?
    6·1 answer
  • Explain the paging concept and main disadvantages of pipelined
    15·1 answer
  • What is the difference of using Selection Tool and Direct Selection Tool?
    6·1 answer
  • What is a web browser​
    9·1 answer
  • You can merge the cells using the rowspan and colspan attribute of the tag <br> true or false​
    7·1 answer
  • Which statement is true about the energy of electromagnetic radiation?
    15·1 answer
  • Discovery of a vulnerability in a software program can potentially be sold to the government. Group of answer choices True False
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!