1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Darya [45]
3 years ago
13

_________ enables customers to combine basic computing services,such as number crunching and data storage,to build highly adapta

ble computer systems.A) IaaSB) EAP peerC) CPD) SaaS
Computers and Technology
1 answer:
Ghella [55]3 years ago
7 0

Answer:

The correct answer to the question is option A (IaaS)

Explanation:

IaaS (Infrastructure as a Service) can be used for data storage, backup, recovery, web hosting, and various other uses as it is cost-effective, and it also has secured data centers. It is a service delivery method by a provider for cloud computing as it enables customers to be offered the service the possibility to combine basic computing services to build and direct access to safe servers where networking can also be done. These services rendered by the providers allow users to install operating systems thereby making it possible to build highly adaptable computer systems.

SaaS (Software as a Service): Here, the service provider bears the responsibility of how the app will work as what the users do is to access the applications from running on cloud infrastructure without having to install the application on the computer.

The cloud provider (CP) as the name suggests is anybody or group of persons that provide services for operations within the cloud.

You might be interested in
Why does the IPv6 format use letters and numbers?
Iteru [2.4K]

Answer:

c is the response hope it helps

7 0
3 years ago
During which part of geologic time did photosynthesis evolve?
m_a_m_a [10]
During Archean part of geological time photosynthesis evolve.
8 0
3 years ago
Read 2 more answers
An alternative to hexadecimal notation for representing bit patterns is dotted decimal notation in which each byte
zysi [14]

An alternative to hexadecimal notation for representing bit patterns is dotted decimal notation in which each byte in the pattern is represented by its base ten equivalent. In turn, these byte representations are separated by periods. For example, 12.5 represents the pattern 0000110000000101 (the byte00001100 is represented by 12, and 00000101 is represented by 5), and the pattern 100010000001000000000111 is represented by 136.16.7. Represent each of the following bit patterns in dotted decimal notation,

a. 0000111100001111 b. 001100110000000010000000c. 0000101010100000

4 0
3 years ago
Which of the following is not one of the four methods for classifying the various instances of malware by using the primary trai
BlackZzzverrR [31]

Answer: Source

Explanation: The malware is the software persisting malicious approach to cause the damage/loss.The primary trait of the malware are infection,concealment,etc.

The concealment refer to the malware such as the Trojan horse, and other viruses that has only purpose to cause the malfunctioning in the system.The virus that get into the other software and then damage the system in known as the infectious malware .

The circulation is the transferring of the virus in the circular manner between the system for the damaging.Thus,the only trait that is not the part of the malware is source.

4 0
3 years ago
What does the acronym OSHA stand for? A. Occupational Safety and Health Administration B. Occupational Safety and Human Activiti
poizon [28]
The answer is A. Occupational Safety and health Administration.
4 0
3 years ago
Read 2 more answers
Other questions:
  • You are researching RAM for a computer you are building for a friend who will be using the system as a home office server for he
    13·1 answer
  • Ruby is creating a presentation. She wants each slide displayed at intervals of five seconds. Which feature in the presentation
    6·2 answers
  • Differentiate among web apps, mobile apps, and mobile web apps.
    14·2 answers
  • opearating system protection refers to a mechanism for controling access by programs, processes, or users to both system and use
    7·1 answer
  • What are the features of Cobol language that make it suitable for programming business applications.
    6·1 answer
  • In workstation domain policies, _________________ provide the specific technology requirements for each device. IT staff uses re
    9·1 answer
  • The__________is an HTML tag that provides information on the keywords that represent the contents of a Web page.
    14·1 answer
  • ¿Por qué es importante usar adecuadamente el celular?
    5·1 answer
  • PLZZZZZZZZZZZZZZZ HELP ME OUT!!!!! I SICK AND TIRED OF PEOPLE SKIPING MYQUESTION WHICH IS DUE TODAY!!!!
    14·1 answer
  • Heya!!<br><br>•DEFINE DATA SCIENCE??<br>(∩_∩)<br><br>#kavya#<br>​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!