1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
suter [353]
3 years ago
12

A small company has hired you to take over its IT needs. The company currently has seven on-site employees and 12 remote employe

es working from their homes and is looking to hire an additional 20 employees in the next six to eight months. the owners of the company are asking you to obtain a business service that will meet the needs of the current staff as well as scale up when the company grows. The services must provide adequate and scalable computing power and storage. which cloud service model should you implement ?
a) Public
b)Private
c)Community
d) Hybrid
Computers and Technology
1 answer:
Ronch [10]3 years ago
8 0

Answer:

HYBRID

Explanation:

What are public, private, community, hybrid cloud service models?

Private: is a model of cloud computing where the data centers are run locally and all the people who are using the system are within the organization. examples are Hewlett Packard Enterprise (HPE) and Dell EMC.

Public: this model involve multiple people or organization using the cloud services with no restrictions of being in a central location. examples are  Microsoft Azure and Amazon Web Services (AWS).

Hybrid: this model combine the pros of both private and public model. its works well for company whose staff is operating as both public and private. Typically, sensitive application can be accessed onsite, mostly production systems, these will be under private and public will have access to test and development environments.

I n this situation the employees are spread on onsite(private) and some people working at remotely (public) and also the companies needs to scale up as the need arises. So it should be Hybrid.

You might be interested in
Question :
BlackZzzverrR [31]

Answer:

D

Explanation:

Search engine optimization (SEO)

4 0
3 years ago
Which of these is an example of an integrated presentation?
elena-14-01-66 [18.8K]
D because integration means that u are almost weaving it into something else so an excel chart into a power point is weaving them together
3 0
3 years ago
Write the definition of a method, isReverse, whose two parameters are arrays of ints of equal size. The method returns true if a
jok3333 [9.3K]

Answer:

The following are code in the Java Programming Language.

//define boolean type function

boolean isReverse(int ar[], int b[])

{

//declare integer type variable

int x;

//set the for loop

for (x=0; x < ar.length && ar[x] == b[ar.length-1-x];  x++);

return x == ar.length;

}

Explanation:

<u>The following are the description of the code</u>.

In the above code that is written in the Java Programming Language, we define the boolean data type function that is 'is Reverse()' and pass two array integer data type arguments that is 'ar', 'b' in the then, declare integer data type variable that is 'x'. Set the for loop that the boolean type value is true or false.

5 0
3 years ago
Your colleague received an E-mail from a bank that is requesting credit card and PIN number information. Which of the following
uysha [10]

Answer: A) Phishing

Explanation:

Phishing is type of attack in computer field that is processed to hack or steal the data of authorized user.The attacker acts as trusted party and then interacts with the authorized user through email or messages to gain  confidential information like pin code, credit card number, login details etc of that user.

  • According to the question, colleague is experiencing phishing as he has been requested for pin-code and credit-card number from a wrong source behaving as authorized bank.
  • Other options are incorrect because ransomware is attack that asks for ransom from authorized user for reviving their access. on system. Spoofing is falsifying as some other party to receive advantage.
  • Mail poisoning is inclusion of inappropriate details in email such as invalid email address etc.
  • Thus, the correct option is option(A).
0 0
4 years ago
How do I add my bestie on brainy? /??!!! ​
ziro4ka [17]

Answer:

You have to remember their name on here

Explanation:

If u dont you cant talk to them again

3 0
3 years ago
Other questions:
  • Which of the following correctly describes the function of an IP address?
    7·1 answer
  • Describe the major research, discoveries, or impact Timothy Berners-Lee has made on the scientific community. 100 points for ans
    6·1 answer
  • Which statement is true of integrating an expert system into the database component of a decision support system (DSS)? a. It re
    14·2 answers
  • What does a page break do?
    13·1 answer
  • Select the correct answer.
    15·2 answers
  • Which statements about editing an existing Contact in Outlook are true? Check all that apply.
    9·2 answers
  • Which of the following is NOT one of the three main ways to control a program when writing code?
    6·2 answers
  • Anyone know what the very first question that was sent on brainly is?
    15·2 answers
  • • Do you think documentaries are best delivered in media such as films or documentary?
    10·1 answer
  • What is computer fundamental ?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!