1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
madreJ [45]
4 years ago
11

NIST recommends selecting cloud providers that support strong encryption, have appropriate redundancy mechanisms in place, emplo

y authentication mechanisms, and offer subscribers sufficient visibility about mechanisms used to protect subscribers from other subscribers and the provider.a) trueb) false
Computers and Technology
1 answer:
WITCHER [35]4 years ago
8 0

Answer:

The answer is "Option a".

Explanation:

In cloud computing, it is also known as the model, that enables you for accessible, convenient, through the-demand network access to global computer resources, which can be rapid to get and published via low administrative effort.  

Its recommending selection for the cloud providers support for the robust encryption, that has adequate replication processes in place, use user authentication, or provide ample clarity to customers regarding mechanisms that defend subscriptions against other subscriptions and the supplier.

You might be interested in
Write an algorithm to find the average of three numbers: 10, 20, 30
STALIN [3.7K]

Language: JavaScript

Answer:

let num = [10,20,30];

average(num);  

function average(num) {

 let sum = 0;

 for(let i in num) {

   sum += num[i];

 }  

 return console.log(sum/num.length);

}

3 0
3 years ago
What issues will the Internet of Things present to Cybersecurity?
Rainbow [258]

Answer:

The IoT offers new ways for businesses to create value, however the constant connectivity and data sharing also creates new opportunities for information to be compromised. Explore some of the more notable developments in the battle to combat cyber risks.

Explanation:

I hope this helps you. UwU. P.S. Plz mark me Brainlyest

5 0
3 years ago
Software licensed as proprietary
steposvetlana [31]

Answer:

Does not permit source code changes.

Explanation:

3 0
3 years ago
Read 2 more answers
Mark for review (Will be highlighted on the review page)
SpyIntel [72]
As of the presented problem, the most probable answer and the most likely one, out of the options presented together with the problem, would be C. Save As.

Of the menu commands that are there, Save As would serve to be the command that you click when you want to make a copy of a currently open file and rename it. The difference between Save As and Save would be that Save would automatically just replace the old file with the new one, considering that there were changes that took over the file. Save As, on the other hand, would make the old file still available but would prompt the user to choose another file name for it and even presents the possibility of the file being saved in another file extension.
3 0
3 years ago
Which of this access specifies can be used for a class so that its members can be accessed by a different class in the same pack
Lelu [443]

Answer:

D) All the mentioned

Explanation:

public: This access modifier allows access from all classes in the program

protected: Means only classes within the same package or sub-classes (inheritance) can access members of the class

No Modifier: Omiting the modifier sets a class to the default. Which implies only classes in the same package can access members of the class.

The given question refers to class members in the same package so any these three access modifiers can be used.

6 0
3 years ago
Other questions:
  • Assume you're presenting to a live audience. What's the best set up for this audience configuration?
    14·2 answers
  • Edhesive 4.1 question 1
    9·1 answer
  • Write a class named Car that has the following data attributes:
    14·1 answer
  • If your DTP document contains watermarks on every page, where can you place them?
    10·1 answer
  • An internet layer is a quantity of data that is transmitted on a netowrk without concern for whether it is accurate or whether i
    5·1 answer
  • Crees que el uso del internet ha mejorado nuestra vida o somos esclavos de ella​
    10·2 answers
  • In a void function, the return statement is not necessarily. True or false? ​
    11·2 answers
  • Ví dụ sau sẽ in ra dữ liệu của x là kiểu gì ?
    9·1 answer
  • write an expression taht evaluated to true if and only if the variable s does not contain the string 'end'
    12·1 answer
  • Ohh I'm so cool It a doge clicker!! What is a doge?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!