1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
prohojiy [21]
3 years ago
5

What is Mobile Edge Computing? Explain in tagalog.​

Computers and Technology
2 answers:
OLga [1]3 years ago
6 0

Answer:

English: Multi-access edge computing, formerly mobile edge computing, is an ETSI-defined network architecture concept that enables cloud computing capabilities and an IT service environment at the edge of the cellular network and, more in general at the edge of any network.

Very very rough Tagalog: Ang multi-access edge computing, dating mobile edge computing, ay isang konsepto ng network architecture na tinukoy ng ETSI na nagbibigay-daan sa mga kakayahan sa cloud computing at isang IT service environment sa gilid ng cellular network at, higit sa pangkalahatan sa gilid ng anumang network.

Explanation:

BigorU [14]3 years ago
3 0

Answer:

Edge computing ay computing na tumatagal ng lugar sa o malapit sa pisikal na lokasyon ng alinman sa gumagamit o ang pinagmulan ng data, na mga resulta sa mas mababang latency at i-save ang bandwidth.

Sa isang cloud computing modelo, compute resources at serbisyo ay madalas na sentralisado sa malalaking datacenters, na kung saan ay na-access ng mga gumagamit sa gilid ng isang network. Ang modelo na ito ay napatunayang gastos bentahe at mas mahusay na mapagkukunan ng resource sharing kakayahan. Gayunman, ang mga bagong anyo ng end-user karanasan tulad ng IOT ay nangangailangan ng compute power sa kung saan ang isang pisikal na aparato o data source talagang umiiral, i.e. sa "gilid ng network."

Sa pamamagitan ng paglalagay ng mga serbisyo sa pagkompleto ng mga serbisyo na mas malapit sa mga lokasyong ito, ang mga gumagamit ay makikinabang mula sa mas mabilis, mas maaasahang mga serbisyo na may mas mahusay na mga karanasan sa gumagamit, habang ang mga kumpanya ay makikinabang sa pamamagitan ng pagiging mas mahusay na upang maproseso ang data, suporta sa mga huling sensitibong application, at gamitin ang mga teknolohiya tulad ng AI /ML analysis upang makilala ang mga trend at mas mahusay na mga produkto at mga serbisyo.

Explanation:

You might be interested in
Which of the following would be done outside of a control room?
LenKa [72]

Answer:

a

Explanation:

8 0
3 years ago
Read 2 more answers
Look at the graph. What is the meaning of the point shown with a star
RUDIKE [14]
The answer is B. 1 Box= 1/2 Pounds
4 0
3 years ago
We have a user Sally Smith who we want to grant the ability to launch applications and browse folders. But we do not want her to
igomit [66]

Answer:

LIST

Explanation:

NTFS is A proprietary journaling file system developed by Microsoft. It started with windows 3.1.

List Folder Contents: Is what Gives authorized user the permission to viewing and listing of files and sub-folders as well as executing of files inherited by folders only.

NTFS permissions applies to every file and folder stored on a volume formatted with the NTFS file system. By default, permissions are inherited from a root folder to the files and sub-folders beneath it, although this inheritance can be disabled.

List Folder Contents will allow you to display the folder's contents and to display the data, attributes, owner, and permissions for files within the folder.

The NTFS permission that applies to the Domain Users group that will allow Sally to do what he wants without allowing more access than necessary is LIST.

8 0
3 years ago
Give an example of SaaS (Software as a service) and explain why this can impact organisational security posture
lara31 [8.8K]

In the case above, An  example of SaaS (Software as a service) are DropBox, UserGuiding and Salesforce.

<h3>How does SaaS (Software as a service) impact organizational security posture?</h3>

Software-as-a-Service (SaaS) security posture management (SSPM) is known to  be a kind of a group that is made up of an automated security tools that is used for tracking security threats in regards to SaaS applications.

<h3>What is organization level security in Salesforce?</h3>

The organizational level is known to be one that gives room for a person to decide if and from where a given users can be able to access the system.

Note that SaaS platforms is made up of software that is said to be available via third-party and they include BigCommerce, Salesforce and others.

Learn more about SaaS from

brainly.com/question/24852211

#SPJ1

4 0
2 years ago
How can chess computers be programmed so that it can be so accurately adjusted to a skill level ranging from a beginner to a gra
Elis [28]
They are artificially intelligent. They watch thousands of hours of videos of the game they are going to play. After they learn, they challenge themselves against themselves and save all the moves it used that time, they play another game against the saved game and if they best it then they save the new and repeat. I am not sure about this because I am just a 15 yr old but the early ones brute forced the game and one. Brute Forcing is a way to try out every possible move and pick the most like to succeed or the most efficient one, brute force is also used in hacking or cracking passwords that have something in common. Like let's say ur password is Jakeis35. I would make a list that would be:
Jake
jake
Is
is
35
34

and with a software it will put together every possible pair and will stop when it matches the password on the server or if the password let it login.
5 0
3 years ago
Other questions:
  • Brad teaches an accounting class, and he created a PowerPoint presentation from a Word outline for his class. This Word outline
    14·1 answer
  • In database systems, the dbms enforces rules about which user can perform which action when. The rules are known as ________.
    10·1 answer
  • Allow chrome to access the network in your firewall or antivirus settings. if it is already listed as a program allowed to acces
    15·1 answer
  • You can add envelopes to existing documents. <br> a. True <br> b. False
    10·1 answer
  • An essential skill today is knowing how to cite sources properly. Creative Commons has a system of licenses and tools for creato
    11·1 answer
  • What is a palindrome?
    13·1 answer
  • On the Excel Ribbon, click the Data tab in the Sort &amp; Filter Group, and then click the Sort button to conduct a _____ sort.
    8·1 answer
  • C programmig : Output all combinations of character variables a, b, and c, using this ordering:abc acb bac bca cab cbaSo if a =
    12·2 answers
  • Problem # 1 [End of chapter problem] The following character encoding is used in a data link protocol: A: 01100111 B: 11110011 F
    14·1 answer
  • Which device is used to direct the flow of data on a computer network?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!