1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margarita [4]
3 years ago
9

Point out the wrong statement :

Computers and Technology
1 answer:
hoa [83]3 years ago
8 0

Answer:

d. None of the mentioned

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Infrastructure as a Service (IaaS).

3. Software as a Service (SaaS).

All of the following statements are true and correct because they are standard internet protocols;

I. Virtual appliances are becoming a very important standard cloud computing deployment object. This depicts the Platform as a Service (PaaS).

II. Cloud computing requires some standard protocols.

III. Cloud computing relies on a set of protocols needed to manage interprocess communications.

You might be interested in
A(n) _____ access file is also known as a direct access file.
zloy xaker [14]
The answer to the question asked  above is <span>remote direct memory .

</span>A remote direct memory  access file is also known as a direct access file.

Hope my answer would be a great help for you.    If you have more questions feel free to ask here at Brainly.

5 0
3 years ago
Evaluation, formatting, expanding/decoding, distillation/reduction, and assessment are examples of ________ computing operations
Pavlova-9 [17]

Evaluation, formatting, expanding/decoding, distillation/reduction, and assessment are examples of <u>fog</u>  computing operations.

The correct option is C.

<h3>What is computing operations?</h3>

An action that is taken in computing to complete a certain task is referred to as an operation. The five fundamental categories of computer operations are input, processing, output, storing, and control. The five major functional components of a computer system each carry out one or more computer activities.

<h3>What are the basic computing operations?</h3>

Arithmetic and logical operations are the two primary sorts of work that CPUs carry out. In contrast to logical operations, which compare two numbers, arithmetic operations involve basic math concepts like addition and subtraction.

<h3>What is  fog  computing operations?</h3>

Both 5G and fog computing

Fog computing refers to a type of computer architecture in which a network of nodes continuously collects data from Internet of Things (IoT) devices. These nodes have millisecond response times and process data in real-time as it comes in. Every so often, the nodes communicate to the cloud analytical summary data.

To know more about computing operations visit:

brainly.com/question/18095291

#SPJ4

I understand that the question you are looking for is:

Evaluation, formatting, expanding/decoding, distillation/reduction, and assessment are examples of ________ computing operations.

A) OpenStack

B) cloud

C) fog

D) RFID

8 0
2 years ago
How does Shakespeare immediately introduce Tybalt as a menacing character?
Scilla [17]

The correct answer to this open question is the following.

Although there are no options attached we can say the following.

William Shakespeare immediately introduces Tybalt as a menacing character in the first moments of the play "Romeo and Juliet" because Tybalt is an aggressive man who does not support the idea of peace or get peaceful agreements to solve problems. Tybalt does not like the Montague people.

“The tragedy of Romeo and Juliet” was written by the English writer William Shakespeare approximately in 1590 and is considered to be a play in a poetic form. It refers to the story of two lovers that belonged to opposite families in dispute. Their love is forbidden. Eventually, both lovers die and that is the reason for their families to reconcile.

5 0
3 years ago
How are headers and footers are useful in presentation​
Svetradugi [14.3K]

Answer:

Explanation:

PowerPoint is a software that allows user to create headers as well as footers which are information usually appears at the top of the slides and the information that appears at the bottom of all slides. Headers and footers are useful when making presentation in these ways:

✓ Both provide quick information about one's document/ data clearly in a predictable format. The information that is provided by the Header and footers typically consist of ;

©name of the presenters,

©the presentation title

©slide number

©date and others.

✓ They help in setting out different parts of the document.

✓Since the Headers and footers can appear on every slide, corporate confidentiality as well as copyright information can be added to footer area to discourages those that can steal ones secrete.

7 0
3 years ago
If your computer is running slowly, which of the following is most likely to solve the problem?
Rom4ik [11]
Rebooting the computer and calling the computer maunfactoring company will help. If not, you could go to a repair shop.
8 0
3 years ago
Read 2 more answers
Other questions:
  • Write the java statement to creat an object mp4 class digital​
    8·1 answer
  • Life changing technology is easy to fall in love with. Describe a feature of a product that did it for you and highlight its ben
    13·1 answer
  • Write methods to do the following: a. Display three full lines of asterisks on the screen. b. Accept as an argument your name, a
    5·1 answer
  • write a Program which displays at least 5 different sentences that explain how technology has been used to win souls to Christ.
    6·1 answer
  • What is the purpose of a report?
    14·1 answer
  • A cookie filter blocks the sending and receiving of cookies. Blocking cookies can reduce some threats of session tracking and id
    12·1 answer
  • A typical day in programming and software development would involve
    7·1 answer
  • True or False: the sky looks blue because it is reflecting the blue ocean.​
    12·2 answers
  • Can someone help me with python
    10·1 answer
  • How does Accenture help companies harness the power of data to achieve optimal business outcomes?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!