1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maks197457 [2]
1 year ago
5

Purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment and softwa

re?
Computers and Technology
1 answer:
Alenkinab [10]1 year ago
8 0

purchasing computer resources from suppliers as an outsourced service All the required hardware and software are owned and maintained by IaaS (Infrastructure as a Service).

<h3>What is computing in Purchase?</h3>
  • Any entire payment made for a good or service is referred to as a buy.
  • The goods or service may be purchased online or at a physical location, such as a store or event.
  • Buying is the act of investing in products or services. A buy is something that has been made.
  • A sell is the opposite of a purchase. A purchase is something that has been paid for or purchased.
  • A pair of pants that someone paid $10 for is an example of a purchase.
  • To obtain (land, houses, etc.) by a method other than descent or inheritance

The complete question is:

Which of the following answers refers to a cloud computing service model in which clients, instead of buying all the hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment and software?

To learn more about Purchase computing, refer to:

brainly.com/question/14561082

#SPJ4

You might be interested in
Describe the five components of a computer
Anna [14]

Answer:

Input, Processing, Storage, Output and Communication devices.

Explanation:

Input devices of computer are like Keyboard, Mouse, Scanner. Output devices of a computer are printers, monitors, and headphones.

There are two storages of computer one of them is REM, which can be lost if computer shutdown/closes. Data stays written on the disk until it's erased or until the storage medium fails (more on that later). An example of a communication device is the microphone.

7 0
2 years ago
In the late 1990s, Microsoft was sued for "tying" its Internet browser, Internet Explorer, to its operating system. A seller for
LekaFEV [45]

Answer:

Section 3 of the Clayton act.

Explanation:

Section 3 of the Clayton act 15 U.S.C.S § 14, makes illegal some kind of distribution practice that facilitates monopolistic arrangement that is section 3 of the Clayton act makes it illegal to enter into tying arrangement, exclusive dealing contracts or requirement contracts if such contracts tends to lessen competition. Where customer is required to pay for an undesired product in order to obtain a desired product.

3 0
3 years ago
Go to the Subset tab, which gives a subset of randomly chosen data from the first tab. Go to your Math Tools and open the Graph
Karo-lina-s [1.5K]

A linear regression model is used to show the relationship between variables on a scatter plot

The equation of the linear regression model is: \^y = 1.56\^x + 1.29 and the correlation coefficient is 0.8034

<h3>How to determine the equation of the linear regression</h3>

The question is incomplete. So, I will make use of a dataset that has the following calculation summary (from a graphing calculator)

  • Sum of X = 45
  • Sum of Y = 83
  • Mean X = 4.5
  • Mean Y = 8.3
  • Sum of squares (SSX) = 82.5
  • Sum of products (SP) = 128.5
  • The value of R is 0.8034.

The equation of the linear regression model is:

\^y = 1.56\^x + 1.29

See attachment for the scatter plot

Read more about linear regression model at:

brainly.com/question/26347582

5 0
2 years ago
When the program generates or populates reports after getting the data and processinng,it is called
TiliK225 [7]

Answer:

In computing, extract, transform, load (ETL) is the general procedure of copying data from one or more sources into a destination system which represents the data differently from the source(s) or in a different context than the source(s).

Data extraction involves extracting data from homogeneous or heterogeneous sources; data transformation processes data by data cleansing and transforming them into a proper storage format/structure for the purposes of querying and analysis; finally, data loading describes the insertion of data into the final target database such as an operational data store, a data mart, data lake or a data warehouse. Hope this helps! PLEASE GIVEE ME BRAINLIST!!! =)

6 0
3 years ago
Assign courseStudent's name with Smith, age with 20, and ID with 9999. Use the print member method and a separate println statem
antiseptic1488 [7]

Answer:

courseStudent.setName("Smith");

courseStudent.setAge(20);

courseStudent.setID(9999);

courseStudent.printAll();

System.out.print(", Id: " + courseStudent.getID());

Explanation:

This is the part of the code that needs to be added in order to print the output same as mentioned in the question. These lines should be added in the main method where solution is asked.

6 0
3 years ago
Other questions:
  • What new england industry quickly collapsed with the discovery of oil in pennsylvania
    9·2 answers
  • This is the formula for the future worth of an investment over time with consistent additional monthly payments and a steady rat
    10·1 answer
  • Explain the differences between apple and android
    14·2 answers
  • What is the purpose of each of the components (each shown with a leader and line) of the circuit shown in the diagram?
    15·1 answer
  • Sorry but, what are brainliest for?
    7·2 answers
  • If you change the text to bold,you are changing the what?
    9·1 answer
  • What is required when opening a checking account?
    10·2 answers
  • Use a while loop to output the even number from 100 to 147? This is python
    10·1 answer
  • Government entities may pressure upstream Internet service providers to _____. a. track and monitor the Internet activities of i
    11·1 answer
  • An Inspect and Adapt (I&amp;A) event is occurring and a program is trying to address a long-existing problem (WIP)?"unreliable P
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!