1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LenaWriter [7]
3 years ago
8

As a result of 5G networks & edge computing there will be an increasing number of different internet connection

Computers and Technology
1 answer:
vfiekz [6]3 years ago
8 0

Explanation:

<h2><em><u>Edge computing with 5G creates tremendous opportunities in every industry. It brings computation and data storage closer to where data is generated, enabling better data control, reduced costs, faster insights and actions, and continuous operations. In fact, by 2025, 75% of enterprise data will be processed at the edge, compared to only 10% today.¹</u></em></h2><h2 /><h2><em><u>Edge computing with 5G creates tremendous opportunities in every industry. It brings computation and data storage closer to where data is generated, enabling better data control, reduced costs, faster insights and actions, and continuous operations. In fact, by 2025, 75% of enterprise data will be processed at the edge, compared to only 10% today.¹IBM provides an autonomous management offering that addresses the scale, variability and rate of change in edge environments. IBM also offers solutions to help communications companies modernize their networks and deliver new services at the edge.</u></em></h2>

Hope this answer is helpful

You might be interested in
Can anyone answer this ​
Ivenika [448]

Answer:

I dont see the question

Explanation:

7 0
3 years ago
Why is it grey? i recently dropped it , the switch is on!
iragen [17]

Answer:

because it is what it is

7 0
3 years ago
After you create an array variable, you still need to ____ memory space.
Svetllana [295]
This is a little tricky. I would say reserve. It would help to know what programming language and class this is for because a lot of times when you create an array variable the memory is put onto the stack and you as the programmer do not reserve memory space. Now on the other hand, if you are programming in C and you want to create an array variable and put it on the heap then you would reserve memory space on the heap.
6 0
4 years ago
Give an example of a function from N to N that is:______.
vichka [17]

Answer:

Let f be a function

a) f(n) = n²

b) f(n) = n/2

c) f(n) = 0

Explanation:

a) f(n) = n²

This function is one-to-one function because the square of two different or distinct natural numbers cannot be equal.

Let a and b are two elements both belong to N i.e. a ∈ N and b ∈ N. Then:

                                f(a) = f(b) ⇒ a² = b² ⇒ a = b

The function f(n)= n² is not an onto function because not every natural number is a square of a natural number. This means that there is no other natural number that can be squared to result in that natural number.  For example 2 is a natural numbers but not a perfect square and also 24 is a natural number but not a perfect square.

b) f(n) = n/2

The above function example is an onto function because every natural number, lets say n is a natural number that belongs to N, is the image of 2n. For example:

                                f(2n) = [2n/2] = n

The above function is not one-to-one function because there are certain different natural numbers that have the same value or image. For example:

When the value of n=1, then    

                                   n/2 = [1/2] = [0.5] = 1

When the value of n=2 then

                                    n/2 = [2/2] = [1] = 1

c) f(n) = 0

The above function is neither one-to-one nor onto. In order to depict that a function is not one-to-one there should be two elements in N having same image and the above example is not one to one because every integer has the same image.  The above function example is also not an onto function because every positive integer is not an image of any natural number.

4 0
3 years ago
Calculate the sum and difference of the given 8-bit unsigned binary numbers. All calculations must be done in binary. Show your
Korolek [52]

Answer:

10010101 + 00101110 = 1 1 0 0 0 0 1 1 , 10010101 - 00101110 = 0 1 1 0 0 1 1 1,

01101101 + 01110011   = 1 1 1 0 0 0 0 0 , 01101101 - 01110011 = - 1  1 1 1  1 0 1  0

Explanation:

10010101 + 00101110 =   1 0 0 1 0 1 0 1

                                    + <u>0 0 1 0 1 1 1 0</u>

                                       <u>1 1 0 0 0 0 1 1</u>

In binary, 1 plus 0 is 1, but 1 plus 1 ( which conventionally is two) is divided by 2 and the result is carried-out, while the remainder is used as the answer.

10010101 - 00101110 =   1 0 0 1 0 1 0 1

                                   - <u>0 0 1 0 1 1 1 0</u>

                                     <u>0 1 1 0 0 1 1 1</u>  

Subtraction in Binary calculation, a borrow to a 0 value is equal to two, this law is implemented in a case where 1 is subtracted from 0 ( which is impossible).

01101101 + 01110011   =   0 1 1 0 1 1 0 1

                                   + <u>0 1 1 1 0 0 1  1</u>

                                      <u>1 1 1 0 0 0 0 0</u>

<u />

01101101 - 01110011   =   0 1 1 0 1 1 0 1

                                   - <u>0 1 1 1 0 0 1  1</u>

                                   - <u>1  1 1 1  1 0 1  0</u>

At the end of the subtraction, if the value subtracted from in less than the subtracted number, two is borrowed and the result becomes negative or signed.

5 0
3 years ago
Other questions:
  • Index addressing is for traversing arrays.<br><br> True<br><br> False
    8·1 answer
  • The function below takes a single parameter number_list which is a list that can contain integers and floats. Complete the funct
    9·1 answer
  • _____ involves those activities that ensure the orderly dissolution of a system, including disposing of all equipment in an envi
    7·1 answer
  • Please draw a diagram of a complete graph with 5 vertices (K5), its adjacency matrix and adjacency list representations.
    5·1 answer
  • Crystal detected a problem in a computer network, due to which she could not send or receive data within the network. She pings
    5·2 answers
  • type of weapon of mass decruction taht spreads deadly radioactive material by way of conventinal explosion
    15·1 answer
  • Written and artistic expressions are protected by
    8·1 answer
  • All of the following are reserved keywords in C++ EXCEPT
    5·1 answer
  • "background" software that helps the computer manage its own internal resources is called ________.
    5·1 answer
  • Impaired drivers are one of the many risks drivers face on the Highway Transportation System. List 3 signs that a driver could b
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!