1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Daniel [21]
2 years ago
13

What describes the curwhat is a cloud-first strategy?rent cloud landscape for business?

Computers and Technology
1 answer:
Rina8888 [55]2 years ago
5 0

A cloud-first strategy promotes building software directly in the cloud rather than building on-premises and migrating to the cloud. The goal is to help you create software faster and reduce the overhead associated with on-premises resources and cloud migration.

You might be interested in
Keyshia wants to add movement to her PowerPoint presentation. Which tab should she use to complete this task
jolli1 [7]

Answer: I belive transitions

Explanation:

6 0
3 years ago
Read 2 more answers
Which theorist studied the power elite and the influence they had over society?
Pavel [41]
The correct answer is <span>C. Wright Mills
He was a rather famous sociologist from the 20th century who also worked as a professor at Columbia university. He was a leftist and one of his famous books "The Power Elite" was crucial in describing class relations in the US between the elites and the regular people.</span>
6 0
3 years ago
A computer's hard disk drive holds 8 x 10^10 bytes of information. If Jill buys an extra memory stick that holds 5.1 X 10^8 byte
denis-greek [22]

Answer:

The computer will store 8.05 *10^10 bytes of information.

Explanation:

This is the same as saying that the computer will now have 80.51 Gigabytes ( 1gb = 1.000.000.000 bytes) of storage. In this case, the number is represented in its decimal form, and the previous one is displayed in Scientific Notation.

8 0
3 years ago
Why am I asked the 4th time to change my email &amp; password?????
dolphi86 [110]
Confirme your email.
3 0
3 years ago
Read 2 more answers
What are the main security weaknesses of coaxial cable, twisted pair cable, and fiber optic cable? How might the router itself b
Paraphin [41]

Answer:

Answered below

Explanation:

Coaxial cables weaknesses include; fluctuation of speed during heavy use, leaks at the point of connection and signal loss over long distances. Twisted pair cables are not durable enough and are susceptible to interference. Fibre optic cables are costly and need expertise to install.

Hacked or compromised routers can be infected with malwares that reroutes users to spam sites and also to ddos attacks.

Steps to protect cable networks include; network encryption, physical security, VPN usage, updating networks, auditing and mapping.

3 0
3 years ago
Other questions:
  • Individually or in a group find as many different examples as you can of physical controls and displays.a. List themb. Try to gr
    15·1 answer
  • What is TCP/IP?
    13·1 answer
  • Using data from a tal distribution database, define a view named toplevelcust. it consists of the number, name, address, balance
    14·2 answers
  • Can I publish all blog post on same day ?
    12·2 answers
  • Why do local variables lose their values between calls to the function in which they are
    5·1 answer
  • Suppose you want to click up- and down-arrows on a "control" to change the value of the product price in cell C7. What form cont
    10·1 answer
  • Mention 5 advantages of internet​
    8·1 answer
  • Match the spreadsheet functions to their operations.
    10·1 answer
  • Write a program that ask a user to input radius of a circle and display circumference of a circle
    13·1 answer
  • Why are digital signals an accurate and reliable way to record and send information?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!