1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DIA [1.3K]
3 years ago
13

In attempts to improve their contribution to the environment a company decides to adapt green computing. Which of these techniqu

es will contribute to green computing?
Computers and Technology
1 answer:
kicyunya [14]3 years ago
6 0

Answer:

A) virtualization

Explanation:

These are the options for the question

A) virtualization

B) grid computing

C) recycling

D) autonomic computing

From the question, we were informed that, In attempts for a company to improve their contribution to the environment the company decides to adapt green computing. In this case, the techniques that will contribute to green computing is virtualization.

Green computing can be regarded as

environmentally responsible use of computer as well as it's resources. It involves Design study as well as manufacturing, and making use of computer and disposing it's device in environmental friendly manner.

Technologies of green computing are:

✓Virtualization,

✓Cloud computing

✓Green Data Center,

✓E-waste control

Virtualization can be regarded as process involving creation of

software-based represention or virtual representation of resources/something.

This resources/ something can be virtual applications, storage as well as networks. It helps in reducing IT expenses and as a result of this, the efficiency as well as agility for all size businesses can be boosted

You might be interested in
Convert the following four unsigned binary numbers to decimal and show your work:
Ber [7]

Answer:

23 ,21,10,63,13

Explanation:

We have to convert binary to decimal

10111 corresponding decimal number is

1\times 2^4+0\times 2^3+1\times 2^2+1\times 2^1+1\times 2^0=23

10101 corresponding decimal number is

1\times 2^4+0\times 2^3+1\times 2^2+0\times 2^1+1\times 2^0==21

01010 corresponding decimal number is

0\times 2^4+1\times 2^3+0\times 2^2+1\times 2^1+0\times 2^0=10

111111 corresponding decimal number is

1\times 2^5+1\times 2^4+1\times 2^3+1\times 2^2+1\times 2^1+1\times 2^0=63

001111 corresponding decimal number is

0\times 2^5+0\times 2^4+1\times 2^3+1\times 2^2+1\times 2^1+1\times 2^0=13

7 0
3 years ago
A security utility program that scans the system for small programs that interfere with how a computer functions are _____ utili
Aneli [31]

Answer:

A security utility program that scans the system for small programs that interfere with how a computer functions are _____ utilities.

Explanation:

7 0
3 years ago
What is imagined risk
lara31 [8.8K]
Hello there!

Imagined Risks are simply 'imaginary' risks that are created out of doubt/fear.

Hope This Helps You!
Good Luck :)
3 0
3 years ago
The function below takes a single string parameter: sentence. Complete the function to return everything but the middle 10 chara
dolphi86 [110]

Answer:

def get_middle_ten(sentence):

   ind = (len(sentence) - 12) // 2

   return sentence[ind:ind + 12]

# Testing the function here. ignore/remove the code below if not required

print(get_middle_twelve("abcdefghijkl"))

print(get_middle_twelve("abcdefghijklmnopqr"))

print(get_middle_twelve("abcdefghijklmnopqrst"))

7 0
3 years ago
This method is employed in order to rapidly change the locations of the website in order to ensure that no one site us used long
tester [92]

Answer:

Fast-flux

Explanation:

The techniques that is used to shift the network without shutdown of website.

4 0
3 years ago
Other questions:
  • Why are high-quality transformers wound with large diameter wire?
    8·1 answer
  • An important task that the operating system performs is ____, which keeps track of the files stored on a computer so that they c
    15·1 answer
  • Which hardware component is most suspect if a user can barely make out
    10·1 answer
  • What are the names of the 3 main languages used for making websites
    10·1 answer
  • (TCO C) When a remote user attempts to dial in to the network, the network access server (NAS) queries the TACACS+ server. If th
    14·1 answer
  • Why would it be unusual to find a fossil of an organism’s eye?
    11·1 answer
  • Dominic's teacher asked him to create a chart or graph to compare the different grade levels in the school's FBLA club. Which ch
    5·2 answers
  • Select the correct answer. Which sign or symbol will you use to lock cells for absolute cell reference?
    9·2 answers
  • Write a method that returns a String that is just the first and last character of the given string Your return value should be o
    8·1 answer
  • Do you trust machine learning application?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!