1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ss7ja [257]
2 years ago
15

Tony purchases virtual machines from microsoft azure and uses them exclusively for use by his organization. what model of cloud

computing is this?
Computers and Technology
1 answer:
ioda2 years ago
4 0

Tony buys virtual machines from Microsoft azure and uses them solely for use by his community. A model of cloud computing is the public cloud

<h3>What is the public cloud?</h3>

A public cloud is a shadow deployment model where computing resources are owned and managed by a provider and shared across multiple tenants via the Internet.

These providers deliver their uses over the internet or through saved connections, and they use a whole pay-per-use approach. Each provider delivers a range of products oriented toward additional workloads and business needs.

To learn more about public cloud, refer to:

brainly.com/question/19057393

#SPJ4

You might be interested in
How do u mark bralienst
Natali5045456 [20]

Answer:

if you want to mark brainleist to tell someone that there answer is the best; then click the crown, which is next to the flag(the object that reports "bad" behavior)

YW!!!!!!!!!!!! :>)

5 0
3 years ago
Which file types have exe and png as their extensions?
svlad2 [7]

Answer:

PNG are for photos and exe are for programs

6 0
3 years ago
When a vehicle strikes a pedestrian, it's most often during A. a period of darkness or low visibility B. the day when pedestrian
yuradex [85]

Answer:

A. a period of darkness or low visibility

Explanation:

When a vehicle strikes a pedestrian, it's most often during a period of darkness or low visibility.

8 0
4 years ago
Read 2 more answers
There is an enormous amount of information on the Internet that is automatically separated into good content and not-so-good con
Lena [83]
False u would figure out yourself if it's good or bad
6 0
3 years ago
What do astronomers call a system that is composed of more than two stars?
Nezavi [6.7K]
Nazils system is the anwser
7 0
3 years ago
Read 2 more answers
Other questions:
  • How can you recognize an unsecured wireless network?
    9·1 answer
  • _____ refers to the physical components used to collect, store, organize, and process data and to distribute information
    7·1 answer
  • MyProgramming Lab
    12·1 answer
  • I'll give brainlyist
    9·2 answers
  • While using a web-based order form, an attacker enters an unusually large value in the Quantity field. The value he or she enter
    15·1 answer
  • 10<br> Which of the following is not one of the most popular Spreadsheet software applications?
    6·1 answer
  • what stage is the most inner part of the web architecture where data such as, customer names, address, account numbers, and cred
    11·1 answer
  • Bits of information are combined into meaningful units so that more information can be held in short-term memory through the pro
    5·1 answer
  • Refer to Table 8-4. Consider the data above (in billions of dollars) for an economy: Gross domestic product (in billions of doll
    12·1 answer
  • A ____ attack is much more substantial than a dos attack because of the use of multiple systems to simultaneously attack a singl
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!