31. |
Using fog we can reduced ____________consumption.
|
||||||||
Answer:
Option (a) |
32. |
Using fog we can reduced ____________.
|
||||||||
Answer:
Option (b) |
33. |
The main difference between edge and fog computing is the __________
|
||||||||
Answer:
Option (a) |
34. |
Defects such as memory allocation, design issues, and exception handling all contribute to _______ issues
|
||||||||
Answer:
Option (a) |
35. |
Data leak, snooping, etc. are all threats to the stored data and can be listed under
|
||||||||
Answer:
Option (c) |
36. |
_______ is a very expensive
|
||||||||
Answer:
Option (a) |