1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kakasveta [241]
3 years ago
7

Which of the following costs should be considered when providing your own Web server instead of using a cloud service provider o

r an Internet Service Provider (ISP)?This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A A hardware and software support technician B A Web development team C The flexible subscription fee that varies upon the resources used D The market response to this decision
Computers and Technology
1 answer:
jenyasd209 [6]3 years ago
8 0

Answer:

A hardware and software support technician

Explanation:

If you provide your own web server, you also need <em>hardware and software support technicians</em> who will configure, manage, maintain and handle failures.

<em>A Web development team</em> is needed either you own your server or you are on cloud.

<em>The flexible subscription fee that varies upon the resources used </em>is an option in cloud.

<em>The market</em> does not response directly to the decision of server hosting

You might be interested in
In which career does the level of education vary the most?
Ksenya-84 [330]
Journalism
all the best
3 0
3 years ago
Read 2 more answers
Items that represent features of smartphones apps
Anestetic [448]
I believe they are icons.
8 0
3 years ago
Piecewise functions are sometimes useful when the relationship between a dependent and an independent variable cannot be adequat
Andru [333]

Answer:

//Set a piecewise function v(t).

function v = vpiece(t)

//Set the condition first for t.

if ((0<=t)and(t<=8))  //Set if condition

// first equation of velocity.

   v = 10*t^2 - 5*t;

//Set the condition second for t.

elseif((8<=t)and(t<=16))  //Set elseif condition

//second equation of velocity.

v = 624 - 5*t;

//set the condition third for t.

elseif((16<=t)and (t<=26))  //Set elseif condition  

//third equation of velocity.

v = 36*t + 12*(t - 16)^2;

//Set the fourth condition for t.

elseif t>26

//fourth equation of velocity.

v = 2136*exp(-0.1*(t-26));

//Last condition.

else

//fifth equation of velocity.

v = 0;

//End of the function v.

end

//set a variable and initialize it to 0.

a=0;

//Starting the loop.

for j = -5: 0.5 : 70

//Increment the value of a by 1.

a = a + 1;

t(a) = j;

v(a) = vpiece(t(a));

//End of for loop.

end

//Plot the graph between t and v.

plot(t,v)

//Write the label for the x-axis.

xlabel('t')

//Write the label for the y-axis.

ylabel('velocity')

//Write the title of the plot.

title('Plot of velocity vs t')

Explanation:

Firstly, we set the piecewise method.

Then we set the first condition, after that we apply the condition of velocity.

Then we set the second condition, after that we apply the condition of velocity.

Then we set the third condition, after that we apply the condition of velocity.

Then we set the fourth condition, after that we apply the condition of velocity.

Then we set the last or fifth condition, after that we apply the condition of velocity.

Then we set the variable "a" to 0.

Then start the loop and increase the value by 1.

And after all, we write the title of the plot.

8 0
3 years ago
Which functions are available in a Word table? Check all that apply.
dexar [7]
All of them are available
3 0
3 years ago
Suspicious activity, like IP addresses or ports being scanned sequentially, is a sign of which type of attack?
Scrat [10]

Answer: It depends, but it is definitely a networking attack.

Explanation:

After scanning for vulnerable ports, I could go in a number of different directions. I could initiate a DOS attack by flooding a vulnerable port with requests. I could also initiate a Man-in-the-Middle attack by intercepting their network traffic (usually through port 80(HTTP) if it's not encryped). Because of this, it is highly recommended to use a VPN, so hackers have a harder time getting your data

6 0
3 years ago
Other questions:
  • How is the EF​ computed? A. ES​ + Activity time B. LF minusActivity time C. ​Min{LS of all immediate following​ activities} D. ​
    11·1 answer
  • Explain SATA peripheral bus operation?
    14·1 answer
  • Which view is used to allow a publisher to view facing pages of a publication at the same time? Normal Master Page Two-Page Spre
    5·1 answer
  • (Best Buy Part A) At a Best Buy store, the forecast for the annual demand of a Motorola cell phone is 15600. Demand forecasts ar
    12·1 answer
  • What kind of printers tend to have problems with ink drying out inside the nozzles when the printer is not used for a period?
    15·1 answer
  • What does a wholesaler do?
    12·1 answer
  • Someone who wants to learn a skilled trade on the job should consider
    6·2 answers
  • Here's a better picture of my pc mouse and keyboard​
    5·2 answers
  • Create a new Java program called MyInfo. Create one or more method(s) that pass the following information as parameters and prin
    8·1 answer
  • a computer technician performed a number of actions to correct a problem. some actions did not solve the problem, but eventually
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!