1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stellarik [79]
3 years ago
13

What underlying concept is edge computing based on?

Computers and Technology
2 answers:
guajiro [1.7K]3 years ago
8 0

Answer:

Edge computing was developed due to the exponential growth of IoT devices, which connect to the internet for either receiving information from the cloud or delivering data back to the cloud. And many IoT devices generate enormous amounts of data during the course of their operations.

Explanation:

GalinKa [24]3 years ago
4 0

Answer:

moving computing resources closer to the source or user of data

Explanation:

Edge computing was developed due to the exponential growth of Iot devices, which connect to the internet for either receiving information from the cloud or delivering data back to the cloud. And many Iot devices generate enormous amounts of data during the course of their operations

You might be interested in
Given a effective delay of 99ms when network usage is 74%, what is the effective delay when network usage = 84% ?
NARA [144]

148.5 ms is the effective delay when network usage = 84% .

<h3>what is a computer network?</h3>
  • A group of computers sharing resources that are available on or offered by network nodes is known as a computer network.
  • Over digital links, the computers communicate with one another using standard communication protocols.
  • These connections are made up of telecommunication network technologies, which are based on physically wired, optical, and wireless radio-frequency means and may be set up in a number of different network topologies.
  • Personal computers, servers, networking equipment, and other specialized or general-purpose hosts can all function as nodes in a computer network.
  • They can have hostnames and are identifiable by network addresses.
  • After being assigned, hostnames act as recognizable labels for the nodes and are seldom updated.
  • Network addresses are used by communication protocols like the Internet Protocol to locate and identify the nodes.

To learn more about the topic, refer to the following link

brainly.com/question/8118353

#SPJ4

3 0
2 years ago
_______a file transfers a copy of the file from the storage media into your computer's memory?
Nana76 [90]
It's opening. I just took PF test (:
5 0
4 years ago
Read 2 more answers
Integrity, positive attitude, and punctuality are considered __________ skills. a. interpersonal b. mathematical c. personal d.
Airida [17]

Answer:

These are personal skill

Explanation:

Interpersonal ;; how you deal with the others.

Mathematical ;; how you use maths.

Verbal ;; how you speak

Those are internal values. They do not fit those others. So personal.!

4 0
3 years ago
Read 2 more answers
Which of these devices can completely stop broadcasts from being passed on across the network? routerswitchaccess ponthub
cestrela7 [59]

Answer

An Access point can completely stop broadcasts from being passed on across the network.

Explanation.

An Access point is a hardware type that is part of local area network which has capability of allowing wireless communication from devices through a wireless stand,which connects in between devices and the network. A good example of these devices are routers that allows wireless devices to connect to a wireless network.So when it is passed on across a network an Access point can completely stop.

8 0
3 years ago
Read 2 more answers
30points!!!! Plz answer quickly
stich3 [128]

Answer:

center

Explanation:

that is the focal point

3 0
3 years ago
Read 2 more answers
Other questions:
  • You are designing a web application that stores static assets in an amazon simple storage service (s3) bucket. you expect this b
    12·1 answer
  • 1. How do you answer questions that require you to draw inferences? (1 point)
    7·2 answers
  • An example of software most commonly associated with productivity software is ____.
    12·1 answer
  • A security analyst is investigating a call from a user regarding one of the websites receiving a 503: Service unavailable error.
    10·1 answer
  • A polyalphabetic cipher uses many ___
    6·1 answer
  • How will you convert a decimal fraction into its hexadecimal form by a process of repeated division and repeated multiplication?
    13·1 answer
  • In the ____ letter style, all components of the letter begin flush with the left margin.
    5·1 answer
  • Can someone help me in my IT (information technology) homework
    10·2 answers
  • First computer to use Windows os?​
    5·1 answer
  • A vpn is used primarily for which purpose?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!