Question
By using renewable energy and reusing water, data centers become more __________________ and don't harm the environment. (2 points)
Responses
infrastructure
infrastructure
sustainable
sustainable
thermal energy
thermal energy
carbon positive
carbon positive
Question 14
Software uses ____________________________ to continuously monitor for suspicious activity and identify cyber attacks. This is known as the science of getting computers to make their own predictions based on past data.(2 points)
Responses
bandwidth
bandwidth
protocol
protocol
machine learning
machine learning
Question 15
What happens if hackers are able to get beyond the cloud defenders? There is another layer of data protection called ______________________. Data is scrambled and is unreadable unless your computer has permission. (2 points)
Responses
encryption
encryption
protocol
protocol
malware
Responses
infrastructure
infrastructure
sustainable
sustainable
thermal energy
thermal energy
carbon positive
carbon positive
Question 14
Software uses ____________________________ to continuously monitor for suspicious activity and identify cyber attacks. This is known as the science of getting computers to make their own predictions based on past data.(2 points)
Responses
bandwidth
bandwidth
protocol
protocol
machine learning
machine learning
Question 15
What happens if hackers are able to get beyond the cloud defenders? There is another layer of data protection called ______________________. Data is scrambled and is unreadable unless your computer has permission. (2 points)
Responses
encryption
encryption
protocol
protocol
malware
Answers
GPT-4o mini
Question 13: By using renewable energy and reusing water, data centers become more **sustainable** and don't harm the environment.
Question 14: Software uses **machine learning** to continuously monitor for suspicious activity and identify cyber attacks. This is known as the science of getting computers to make their own predictions based on past data.
Question 15: What happens if hackers are able to get beyond the cloud defenders? There is another layer of data protection called **encryption**. Data is scrambled and is unreadable unless your computer has permission.
Question 14: Software uses **machine learning** to continuously monitor for suspicious activity and identify cyber attacks. This is known as the science of getting computers to make their own predictions based on past data.
Question 15: What happens if hackers are able to get beyond the cloud defenders? There is another layer of data protection called **encryption**. Data is scrambled and is unreadable unless your computer has permission.