1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DIA [1.3K]
3 years ago
13

In attempts to improve their contribution to the environment a company decides to adapt green computing. Which of these techniqu

es will contribute to green computing?
Computers and Technology
1 answer:
kicyunya [14]3 years ago
6 0

Answer:

A) virtualization

Explanation:

These are the options for the question

A) virtualization

B) grid computing

C) recycling

D) autonomic computing

From the question, we were informed that, In attempts for a company to improve their contribution to the environment the company decides to adapt green computing. In this case, the techniques that will contribute to green computing is virtualization.

Green computing can be regarded as

environmentally responsible use of computer as well as it's resources. It involves Design study as well as manufacturing, and making use of computer and disposing it's device in environmental friendly manner.

Technologies of green computing are:

✓Virtualization,

✓Cloud computing

✓Green Data Center,

✓E-waste control

Virtualization can be regarded as process involving creation of

software-based represention or virtual representation of resources/something.

This resources/ something can be virtual applications, storage as well as networks. It helps in reducing IT expenses and as a result of this, the efficiency as well as agility for all size businesses can be boosted

You might be interested in
____ is an iterative software development process that focuses on team productivity and delivers software best practices to all
cluponka [151]

Answer:

RUP

Explanation:

RUP or Rational Unified Process is an IBM's software that divides the development process in four phases. It was developed to work throughout the entire software development life cycle, it's adaptive.

I hope you find this information useful and interesting! Good luck!

5 0
3 years ago
Apakah ada yang bisa menjelaskan potongan source code ini?
GarryVolchara [31]

This code attempts to fuse two strings together. So,

fuse("Apple", "Banana")

would return "ABpapnlaen a"

However, there are a couple of things wrong with this code:

- The for loop is incomplete (probably a copy paste error)

- It is unclear from the code if the array jawaban will overflow if kata1 and kata2 are large (it probably will)

- Biggest problem: the jawaban array is declared on the stack, which means it will be cleaned up when the function returns. So the caller of this function will reference unallocated memory! This is a huge bug!!

6 0
3 years ago
Hello 10 points if my Chromebook is on 26 percent how much time do I have left theoretically
velikii [3]
About 15 minutes.......
7 0
2 years ago
Read 2 more answers
It can be hard to get close enough to photograph animals in the wild true or false
marysya [2.9K]

Answer:

True

Explanation:

8 0
2 years ago
Read 2 more answers
Is techonology better? Lot of votes needed.
Nataliya [291]
In some ways yes but others... not so much. we have access to amazing things that can help so many people and some are tearing people apart or are used for illegal things. its really everyone's own opinion because of some interactions (positive or negative) that can influence them.
5 0
3 years ago
Other questions:
  • 3. If the typical balance on Lucy's credit card is $750 and the interest rate (APR) on her credit card is 16%, how much in inter
    11·2 answers
  • A disadvantage of using an arithmetic mean to summarize a set of data is that __________.
    13·1 answer
  • A(n) ____ instruction might look like a meaningless string of 0s and 1s, but it actually represents specific operations and stor
    9·1 answer
  • What is my favorite color?<br> Red<br>Orange<br>Yellow<br>Blue <br>Gold<br>Silver
    13·1 answer
  • Is backing up computer files done on the hard drive?
    14·2 answers
  • Your organization uses a type of cryptography that provides good security but uses smaller key sizes and utilizes logarithms tha
    9·1 answer
  • What is wrong with this code and correct it.
    12·1 answer
  • When a collection of honeypots connects several honeypot systems on a subnet, it may be called a(n) honeynet
    9·1 answer
  • Read the scenario below, and then choose the right type of computer for each person from the drop-down menus. Three of your frie
    12·1 answer
  • AYUDAAA ESPARA HOYYY
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!