1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sukhopar [10]
4 years ago
13

A cloud service provider offers web mail services to its subscribers. Which cloud service model does this depict?

Computers and Technology
1 answer:
kaheart [24]4 years ago
6 0

Answer:

SaaS

SaaS is the cloud service model that depicts web mail services. Explanation: The Software as a Service (SaaS) patterns are usually accepted by several companies that want their business to have some benefit from application usages without any 'need to maintain' and update several components and infrastructure.

Explanation:

You might be interested in
Write a MATLAB code for the following problem:
AysviL [449]
<span>Here is matlab that should work % cos(x) = 1 - (x^2)/2! + (x^4)/4! -(x^6)/6!+(x^8)/8!... % let y= x*x % cos(x) = sum( (-y)^n/(2n)! ) format short x= 0.3*pi; y= x*x; for N= 1:6 n= 0:N; s1= [(-y).^n./factorial(2*n) ] mac= sum(s1); cx= cos(x); str= sprintf('%d terms. series: %12.10f cos(x): %12.10f\n %12.10f',... N, mac,cx, (cx-mac)); disp(str); end;</span>
7 0
3 years ago
What laws are broken when you hack someone?
postnew [5]

Answer:

it depends

Explanation:

if you are hacking for a purpose that is benefiting the person being hacked, that is ethical hacking. ethical hacking is not illegal, as long as you get permission from the person being hacked.

if you hack someone without their knowledge, that is unethical hacking, and that is in many cases, a crime, and if it has enough of a detrimental effect on a companys process, it could land you into prison and earn you a hefty fine.

ethical hacking is good for testing a networks security, and if all is well, the ethical hacker shouldnt be able to get into a network if it is secured properly.

6 0
3 years ago
Which best describes the condition under which the Unicode output is the same as plain text?
Nostrana [21]

Answer:

When the text contain the ASCII code (Which contains the character) is the correct answer of the above question.

Explanation:

ASCII is used for the Unicode for the computer system. The full form of this is the American standard code of information interchange.  It is a code that is used by the computer system for their personal use. It is because no one can hack the information from the system. If anyone can do so then they can get that text which has no mean.

The above question asked about the condition in which Unicode output is the same from plain text. So the answer is ASCII code because the ASCII code and the Unicode are the same. The only difference between them is the representation of bits.

3 0
3 years ago
is a measurement that quantifies how much information can be transmitted over the network. A. Memory B. DMZ C. Bandwidth D. Clou
AnnZ [28]

Answer: Bandwidth....

6 0
3 years ago
An identifier that is prefixed with an @ and allows you to use code written in other languages that do not have the same set of
Nina [5.8K]

Answer:

Verbatim Identifier

Explanation:

  • Verbatim Identifier contains @ symbol as a prefix by which enables you to use reserved words of a programming language as identifier. For example the keywords like int, double, goto, char, else, while, for, float etc can be used as strings or variable names if @ symbol is added before these words e.g. @char, @while, @void, @int etc.
  • The compiler of a language will recognize such identifiers as verbatim identifiers and compiles them without giving an error that these are reserved words.
  • Verbatim identifier is used for program that is written in other languages and those languages don't have same reserved words.
  • For example: cout<<"use of verbatim identifier";<<@for;   In this statement, for keyword which is used in for loop can be used as an identifier with @ in the prefix.
  • The escape sequences if used with @ symbol in prefix then they are interpreted in a different way. For example in C#

                              string a = "\\C:\torrent\new\file";

                              Console.WriteLine(a);

This statement will give the following output:

                              \C:          orrent

                               ewfile

This means that the \t in the start of torrent and \n in the start of new word is taken as an escape sequence and output displayed is giving tab space because of \t and prints the rest of the words in new line because of \n escape sequence.

Now lets use this with the @ symbol

                               string a = @"\\C:\torrent\new\file";

                                Console.WriteLine(a);

The output will now be:

                                \\C:\torrent\new\file

\t and \n are not taken as escape sequences by the compiler because of @ symbol.

4 0
4 years ago
Other questions:
  • Which of the following steps in enumeration penetration testing extracts information about encryption and hashing algorithms, au
    13·1 answer
  • Rather than manually setting a print area each time you want to print a range, you can ____ the range.
    13·1 answer
  • 22 If you are involved in a violation and you do not have insurance to comply with the __________________, your driver license a
    9·2 answers
  • What cell phone technology is the most popular in the united states?
    8·2 answers
  • List two ways to exit the room properties dialog box, saving changes to the room
    12·1 answer
  • The device used to connect a network to the internet is called a
    7·1 answer
  • The _________ indicates the number of elements, or values, an array can hold
    14·1 answer
  • I need help for preparing for a presentation. Can someone give me advice so I don't have a panic attack again?​
    11·2 answers
  • On the Format tab, which group allows you to select a different font for a chart?
    7·2 answers
  • Type of cable installed on a patch panel?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!