Best sustainable practices for delivering digital technologies to clients

Answers

Answer 1

Answer:

Recommend the client spread out their data centers to distribute energy usage globally.

Explanation:

Have a great day!

Answer 2

The technology can be made sustainable by asking clients to spread the data centers and by sustainably incorporating the design.

What are sustainable practices?

Sustainable practices are the approach that uses technology with respect to the protection of the environment. The social, economic, and environmental balances are established when sustainable computational technologies are implemented.

This practice allows the client to spread the centers and applications globally on a large scale and can be accomplished by building the software once and should avoid redeveloping.

Therefore, to distribute the energy the data centers must be established.

Learn more about computational sustainability here:

https://brainly.com/question/26133975

#SPJ2


Related Questions

Create a raptor program that asks to user to enter 10 numbers into an array. Then display all the numbers, the smallest and the largest. Be sure to add prompts and labels to your input and display.

Answers

This is the raptor program written in Python 3.8:

########################################################

ten_numbers = [ ]

# get the ten numbers

print("Enter 10 numbers")

for i in range(1, 11):

   num = int(input("[{ }] (Enter number and press enter to accept): ".format(i)))

   ten_numbers.append(num)

# get the smallest and the largest

smallest = min(ten_numbers)

largest = max(ten_numbers)

# display the results

print("The list of numbers is: { }".format(ten_numbers))

print("The smallest number in the list is { }, and the largest is

           { }.".format(smallest, largest))

########################################################

The raptor program

Uses a for loop to get the 10 numbers into a list. Then, it uses the in-built Python min and max functions to get the smallest and largest numbers in the list.

Learn more about Python lists here: https://brainly.com/question/24941798

The mean of a sequence of n numbers is m. If we split the sequence into two sequences of lengths n1 and n2 and compute their means m1 and m2, which of the following is TRUE?

The mean of a sequence of n numbers is m. If we split the sequence into two sequences of lengths n1 and n2 and compute their means m1 and m2, which of the following is TRUE?

Answers

The mean of a sequence of numbers is the average.

The true statement is: [tex]\mathbf{mn = m_1n_1 + m_2n_2}[/tex]

The given parameters are:

[tex]\mathbf{Mean=m}[/tex]

[tex]\mathbf{Size=n}[/tex]

The mean of a dataset is calculated as:

[tex]\mathbf{Mean = \frac{Sum}{Count}}[/tex]

So, we have:

[tex]\mathbf{m = \frac{Sum}{n}}[/tex]

Multiply both sides by m

[tex]\mathbf{Sum = mn}[/tex]

When the sequence is split into two, we have:

[tex]\mathbf{\sum x_1 = m_1n_1}[/tex]

[tex]\mathbf{\sum x_2 = m_2n_2}[/tex]

Where:

[tex]\mathbf{Sum = \sum x_1 + \sum x_2}[/tex]

So, we have:

[tex]\mathbf{mn = m_1n_1 + m_2n_2}[/tex]

Hence, the true statement is: [tex]\mathbf{mn = m_1n_1 + m_2n_2}[/tex]

Read more about mean and averages at:

https://brainly.com/question/25421763

Cho lược đồ CSDL “Quản lý BÁN HÀNG” có các bảng như bên dưới. (Thuộc tính in đậm và
gạch chân là khóa chính, gạch CHÂN NÉT ĐỨT là khóa ngoại. Kiểu dữ liệu và độ rộng của
các thuộc tính tự chọn sao cho phù hợp.

Answers

sorry i donnt speak chinese

To classify wireless networks by coverage, which of the following are wireless networks?
A- WPAN
B-WLAN
C- WMAN
D- WWAN

Answers

Answer:

B -WLAN

Explanation:

Use the edit icon to pin, add or delete clips.

Ms. Miller recently performed a little experiment for her photography class. She dressed a model in a generic outfit and asked two different photographers to photograph her using the same set and lighting. The students observed that the images produced by each photographer were vastly different likely due to artistry; however, one student mentioned that something else might be at play here. What other factor MOST LIKELY caused these images to turn out so differently?

A.
the instructions Ms. Miller gave to each photographer

B.
the communication and feelings each photographer was able to evoke in the model

C.
the level of education and how much experience each photographer has

D.
time and stress levels of each photographer

Answers

Answer:

C. the level of education and how much experience each photographer has.

Despite some having degrees in film, visual art, or design, the majority of photographers are self-taught. As you earn more and more XP, you can advance through the eight levels of photography

What experience do you need to be a photographer?

There are no formal educational qualifications to become a professional photographer. Despite some having degrees in film, visual art, or design, the majority of photographers are self-taught. Many photojournalists hold journalism degrees or have a wealth of practical experience.

As you earn more and more XP, you can advance through the eight levels of photography. According to the video, the phases you'll move through as you level up are as follows: (0) Just Starting, (1) Keyboard Photographer, (2) Gear Geek, (3) The Student, (4) The Casual Snapper, (5) Hobbyist, (6) Online Legend, and (7) The Pro.

Therefore, the correct answer is option C. the level of education and how much experience each photographer has

To learn more about the level of education refer to:

https://brainly.com/question/19475756

#SPJ2

TRUE OR FALSE:
To make an object "active", you click on the picture,
image, or object and it shows the bounding box.

Answers

Answer:

True

Explanation:

I just know the answer because I'm a genius hehe

A keyboard would be considered _____. Select 2 options.

an input device

storage

an output device

software

hardware

Answers

Answer:

input devise and hardware

Explanation:

Which character is midway between the 3rd character from left and 6lh character from rights

a. 2
b. 3 ANS
c. 8
d. Y

Answers

Answer:

D

Explanation:

Show the stages of running Shellsort on the input 8, 9, 7, 5, 4, 6, 3, 2, 1 using increments {1, 3, 7}.

Answers

Answer correct this………..

A security architect at a large, multinational organization is concerned about the complexities and overhead of managing multiple encryption keys securely in a multicloud provider environment. The security architect is looking for a solution with reduced latency to allow the incorporation of the organization's existing keys and to maintain consistent, centralized control and management regardless of the data location. Which of the following would best meet the architects objectives

a. trusted platform module
b. IaaS
c. HSMaaS
d. PaaS

Answers

Answer:

a. trusted platform module

i thinks it will help you

Explanation:

g Deliverables: 1.Referencing the Arduino attachInterrupt() documentationand the provided code, what does the attachIntterupt() function call on line 19 do, and how does that work with the magnet_detected() function

Answers

Answer:software routine that hardware invokes in response to an interrupt.

Explanation:

in microsoft word, level 1 is automatically formatted as

Answers

Answer:

Level 1 is the highest or main level of heading, Level 2 is a subheading of Level 1, Level 3 is a subheading of Level 2, and so on through Levels 4 and 5. Headings are covered in Sections 2.26 and 2.27 of the APA Publication Manual, Seventh Edition.

Explanation:

What is software and what types of softwares?

Answers

Answer:

the programs and other operating information used by a computer

Explanation:

system software and application software

Answer:

Software is a group/collection of commands that tell a computer how to work/run. Software is the contrast for hardware which is a discussed topic in the software field.

Examples of software are, an Internet browser, Operating system, Movie player, Graphics program, etc.

which one is larger in size. a word document file or a pdf file?

Answers

Answer:

Pdf file is larger than document file

Explanation:

.

Interface elements include but are not limited to:

Question 3 options:

A. Navigational components, containers, interaction design


B. Input controls, navigational components, visual design


C. Input controls, informational components, containers


D. Input controls, informational components, visual design


E. Navigational components, informational components, visual design

Answers

Interface elements include but are not limited to: C. Input controls, informational components, containers.

A visual programming language is also commonly referred to as graphics user interface builder (GUI builder) and it can be defined as a programming tool that avails programmers the ability to develop software programs (applications) through the use of graphical elements and figures rather than texts alone.

Interface elements refers to the graphic tools that are used by programmers in the design of a user interface on a software program.

In Computer programming, some of the interface elements used include the following:

Input controls: it comprises buttons, radio buttons, list boxes, dropdown lists, checkboxes, text fields, toggles, date field, etc.Informational components: these are progress bar, icons, notifications, tooltips, modal windows, message boxes, etc.Containers: they are made up of accordion.Navigational components: these are slider, search field, slider, tags, pagination, breadcrumb, icons, etc.

Read more: https://brainly.com/question/19341134

1. How many colors are available in color. palette.
2. 20 colors are available in color palette. True / False​

Answers

Answer:

16 colors in the palette

false only 16 colors

Kayla is on-location shooting a wedding while her other employees will be holding down the office and taking care of any walk-ins. Kayla left them written reminders and instructions for some things that they need to take care of in her absence. How did Kayla MOST LIKELY leave these instructions?

A.
in shot lists being created for upcoming events

B.
in purchase orders for equipment that needs to be ordered

C.
in memos she wrote prior to leaving

D.
by telling the models who would be photographed that day

Answers

Answer: A

Explanation:

In short lists being created for upcoming events did Kayla MOST LIKELY leave these instructions. Hence, option A is correct.

What is short lists?

Every camera shot that needs to be recorded in a scene for a video production is listed in detail on a shot list.

A shot list, created by the director and cinematographer during pre-production, is a thorough list of each shot that must be taken on a particular shoot day. Its main objective is to deconstruct a scene into detailed phases that can be used as a guide for your day of shooting.

A shot list is a breakdown of each shot of each scene and the order in which you plan to shoot them, whereas a storyboard shows your cinematographer and production designer your vision for each specific scene.

Thus, option A is correct.

For more information about short lists, click here:

https://brainly.com/question/13099126

#SPJ2

What is considered a relatively new science that is being developed?
O targeting advertising to number of downloads
O targeting advertising to demographics
O targeting advertising to geography
O targeting advertising to adolescents

Answers

Answer:

b

Explanation:

Targeting advertising to demographics  is considered a relatively new science that is being developed. Option (b) is correct.

What do you mean by Geography?

The study of places and the interactions between people and their environs is known as geography. Geographers study the surface of the Earth and the various human societies that live there.

Advertising refers to the methods used to draw attention to a good or service. In order to attract consumers' attention, advertising seeks to highlight a good or service. It is often used to market a particular product or service, although there are many other applications as well, with commercial advertising being the most popular.

Through "branding," which links a product name or image with particular traits in consumers' minds, commercial advertising frequently aim to boost consumption of their goods or services.

Therefore, Option (b) is correct. Targeting advertising to demographics  is considered a relatively new science that is being developed.

Learn more about Geography, here;

https://brainly.com/question/1462956

#SPJ2

WHAT DO YOU KNOW?
Why would you want to change your Table
Properties?

Answers

read the slides ;  Table Properties are the way the table appears or looks.

Why is it good to be a computer programmer?​

Answers

Answer: With programming, you have more freedom than with other jobs. The majority of programming job openings are remote, giving you plenty of freedom to complete your duties.

Explanation: You can work wherever you want with programming jobs, especially if you have a good reputation.

In cell G5, enter a formula without using a function that subtracts the actual dollars billed from the estimated amount to determine the remaining amount of the estimate for general administrative services

Answers

Using the appropriate excel syntax, the formula which calculates the actual amount from estimated amount is : =C10 - D10

Using the cells thus :

Actual dollar billed = C10Estimated amount = D10

Using the cell values defined above ; the required excel syntax is as follows :

=C10 - D10

Note : All excel formulas begin with the equal to sign.

Learn more : https://brainly.com/question/25644130

vA student found a book on the library bookshelf last week, and recorded the source information.

Book title: My Traitor’s Heart Author: Rian Malan

Publication date: 1990 Publisher: Bodley Head Publication city: London

Use the drop-down menus to indicate how the student should format this source on a works-cited list.


My Traitor’s Heart.
London:

Answers

Answer:

3,1,2,1

Explanation:

got it right on edge

have a nice day

:)

Answer:

1. Malan, Rian

2. London:

3. Bodley Head, 1990

4. Print

Explanation:

did it

What sets blockchain solutions apart from conventional record-keeping solutions?

Answers

Blockchain technology are in commonly used in this dispensation. The thing that sets blockchain solutions apart from conventional record-keeping solutions is simply the ability to share different versions of the same data to multiple parties.

Blockchain is known to buildup trust, security, transparency, and the traceability of data shared across a business network. It also minimize cost  with new efficiencies.

It is simply known to be distributed ledger technology that helps in the storage of information in the form of blocks and no one can change or add the data.

See full question below

What sets blockchain solutions apart from conventional record-keeping solutions?

the ability for multiple parties to be certain they are using the same data

the ability to share different versions of the same data to multiple parties

a focus and priority on bitcoin and cryptocurrency

a system that maintains rigor and complexity

Learn more from

https://brainly.com/question/21105181

calculate the speed when given the amount of 1TB to be transfer in 5hrs.

Answers

Answer:

Data transfer rate is the speed that a certain amount of data is transferred over a given period of time. You might want to know the transfer rate if you’re downloading something online or transferring data from one source to another. First, convert your units so the file size and transfer speed are in either bits or bytes with the same prefix (kilo, mega, giga, or tera). Then, plug your numbers into the equation S = A ÷ T in which A is the amount of data and T is the transfer time to solve for S, the speed, or rate, of transfer. You can also determine the amount of data or the transfer time if you know one of the variables plus the speed of transfer.

Explanation:

An information of a 500GB is transferred at the speed of 10MB/s. Calculate the full time the information will be transfer.

Answers

Answer:

50,000 seconds

Explanation:

First multiply 500GB into 1000.(*1GB is equal to 1000MB so were going to multiply it so that we can get the exact MB) and we will get 500,000 MB. Then let's divide it by 10.(*since 10MB can be transfer in just one second.) and we will get 50,000 SECONDS.

Hope it can help you lovelots

Write a class number which has Following
N - integer
Methods
Default constructor
Argument constructor
setN method to change the value of N
isprime() to check that N is a prime number isarmstrong to check N is Armstrong iseven() to check if N is even or odd these method should also work for given numbers
class should have provision to know the count of objects

Answers

The Python program implementing the required features of the class number is lengthy. So, it is attached to the answer as an image

First, two attributes are defined in the class:

A class attribute called count_instances that is incremented anytime an instance is created. Thus, it keeps count of the number of instances created.An instance attribute called N that stores the number

Python does not allow operator overloading by default. To implement default and argument constructors, use default/optional arguments. Though there are other ways, this is the simplest approach for the purposes of this problem.

The isPrime method checks if the constructed number is a prime number. The for loop runs from 2(since this is the first prime number) to int(sqrt(N)), and checks which of these numbers divides N. If none divides N, then N is prime, and it returns true, else it returns false.

isArmstrong checks if the number is an Armstrong number. To easily get the order of the number, the number is converted to a string and the number of characters is gotten.

The number is an Armstrong Number if

[tex]abc...=a^n+b^n+c^n+...[/tex]

where

[tex]n=\text{order of the number, or, number of digits in the number}\\a,b,c,...=\text{the individual digits of the number}[/tex]

See another example on Prime numbers here: https://brainly.com/question/20379340

4. When working at the CLI in Linux, you specify the exact location of a file, which is the ____________________ to it, by beginning with a forward slash (/) to indicate the root directory.

Answers

Command line interface is used in form of a messenger conversation with your computer. You specify the exact location of a file, which is the pwd to it.

The Command Line Interface (CLI), is said to be a non-graphical, text-based interface attached to the computer system.

It is where the user input in a command and the computer then successfully executes it.

The Terminal is known to gives the command line interface (CLI) environment to the user.

The pwd command is simply known to be used in determining an exact folder location or path in Terminal.

Learn more from

https://brainly.com/question/25435538

What are the main approaches for dealing with deadlock?

Answers

Answer:

Deadlock ignorance

Deadlock prevention

Deadlock avoidance

& Detection and recovery

Hope This Helps!!!

. Circle the correct choice for each statement 1. The number of substances in a mixture (can - cannot) be varied, for a compound they (can - cannot). 2. The different substances in a mixture (can - cannot) be joined chemically; a compound (can - cannot). 3. Substances in a mixture (do - do not) keep their own properties. 4. Substances in a compound (can - cannot) be easily separated; in a mixture, they (can - cannot). 5. Examples of (mixtures - compounds) are air, sea water, and most rocks. 6. Examples of (mixtures - compounds) are water, salt, and sugar. 7. Compounds are made of elements and have a (physical – chemical) formula. 8. A (solvent - solute) is the substance that dissolves in another substance. 9. True or False: A mixture cannot have five substances. 10. True or False: In a suspension, a substance may sink to the bottom.

Answers

Answer:

1 cannot

can

2 can

cannot

3 do not

4 can

cannot

5

An application maintains social security numbers and birth dates in a database to track medical records across multiple offices. To maintain the personally identifiable information (PII), which of the following de-identification methods should the application adopt?

Answers

There are different ways of management.  To maintain the personally identifiable information (PII), Data masking as an de-identification methods should the application adopted.

Data masking is also called data obfuscation. This is simply known as the way of improving or modifying sensitive data so that it has no/little value to unauthorized intruders while still being usable by software or authorized personnel.

It often functions by shielding confidential data, such as credit card information, Social Security numbers, names, addresses, and phone numbers etc.

Learn more from

https://brainly.com/question/13438921

Other Questions
A client with an exacerbation of colitis is placed on a low-residue, blehigh-protein diet, and vitamins B, C and K are administered parenterallydietary regimen is designed to reduce:A.Gastric acidityB. Colonic irritationC. Electrolyte depletionD. Intestinal absorption Assuming that the data for all employees follows the same pattern, which kind of relationship isthere between years of higher education and current salary?A- a clustered relationship B- there is no relationship C- a negative correlation D- a positive correlation i need help plz the question is in the image What is the constant of proportionality in the equationBelow the central ideas of islam are most similar to those of which other religion? why dose gregor cover the picture of the woman in the fur coat with his body Question One : 6.4 x 1.2 Question Two : 3.5 x 4.9 Question Three: 8.4 x 5.2pls SOLVE and EXPLAIN how you got itAnd pls don't put files in here On August 1, Harris Co. determines that it cannot collect $200 from its customer, L. Dash. Harris Co. uses the direct write-off method, so they will record the write-off of this account by debiting: would this be A? Im not too sure about this. resistance by political parties to mobilizing disengaged americans to vote because their lack of involvement makes their allegiance to one or the other party suspect creates a: I need help with this please. 1. Which value is the closest to 1/9 24/25 (fractions) a. 0 b. 0.5 c. 1d. 21/20 (fraction) Explain your answer: underline the pronoun in the sentence8. They look very tired. True or False: The purchases of items from foreigners will be greater than the sales of items to foreigners. True False Mofor had $21 to spend on two notebooks.After buying them he had $13. How muchdid each notebook cost?Two-step equations Fires that occur as result of human action or inaction but without malicious intent are classified as:Select one:A. unintentional.B. natural.C. accidental.D. negligent. Write a different title for the story, "The Duel." In a short essay, explain why your title is more appropriate. a trip from Austin to Dallas takes about 3 hours going 65 mi/hr north is this speed, velocity, or acceleration? The Principle of ________ states that changes in the Earth's crust during geological history have resulted chiefly from sudden violent and unusual events. Select each correct answer, you would really help me out! Find the inverse function in slope-intercept form (mx+b):f(x) = -x - 5