1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivann1987 [24]
4 years ago
5

A _____ cloud allows an organization to take advantage of the scalability and cost-effectiveness that a public cloud computing e

nvironment offers without exposing mission-critical applications and data to the outside world.
Computers and Technology
1 answer:
balu736 [363]4 years ago
5 0

Answer:

Hybrid

Explanation:

Hybrid cloud is a solution that combines a private cloud with one or more public cloud services, with proprietary software enabling communication between each distinct service.

You might be interested in
[2]<br> (c) Describe how the microprocessor can determine when to sound the clock alarm.
Oliga [24]

Answer:

The first is to set .As soon as the timer is set,the microprocessor starts counting. When the number it counts to is the same as the number of cycles.

7 0
2 years ago
list = 7 # these many modified Fibonacci numbers. def fibonacci_gt(n, t1, t2): if n&lt;0: print("Incorrect input") elif n == 0:
Aloiza [94]

Answer:

Being Python code the output will be an exception.

Explanation:

The function body of <em>generate_numbers</em> is calling the BIF <em>round</em>, which expects at least one argument of a numeric type, the first is the number to be round, and the second optional one is the precision after the decimal point. The call to <em>round</em> in <em>generate_numbers</em>,<em> </em>the first argument is a list, throwing a TypeError exception.

5 0
4 years ago
5. (01.04 LC) What is it called when one specific character is pulled out from a string? ( O Concatenating
shutvik [7]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct option for this question is Indexing. String indexing is a process that pulled out a specific character from a string. Because string store characters at their index position starting from zero. If you want to pull out a specific character of string at 5th position, then you specify that specific index i.e 5th. For example, a string "elephant" in the 5th position of the character is "a".

While other options are not correct because string concatenating adds character or concatenate to an existing string. for example, the string "Hello" can be concatenated with other string such as "James". After concatenation, the string becomes "Hello James".

String removing removes the string element at the specific index while string slicing is pulling out a group of characters from the string.  

8 0
3 years ago
as a sales person which size hard disc would you recommend a customer who needs to use Microsoft PowerPoint application?
Anettt [7]

Answer:

Not very big - maybe 64 GB or 128 GB

Explanation:

PPT doesn't take up much space

4 0
3 years ago
Trying to create a list of valid email addresses by sending email to randomly generated addresses and seeing which ones are deli
Zina [86]
It is called phishing. Phishing is the endeavor to acquire delicate data, for example, usernames, passwords, and Visa points of interest, frequently for vindictive reasons, by camouflaging as a reliable substance in an electronic correspondence. 
Phishing is ordinarily done by email satirizing or texting, and it regularly guides clients to enter individual data at a fake site, the look and feel of which are practically indistinguishable to the true blue one.
3 0
3 years ago
Read 2 more answers
Other questions:
  • Crowdsourcing is:
    5·1 answer
  • Element will you include to present numerical data on the slide
    13·1 answer
  • Write the class Calculator including: a function called addthat takes two parameters containing double values and returns their
    9·1 answer
  • What is an input periphal
    8·2 answers
  • A(n) __ is a list of main points and sub-points of a topic to include in a presentation
    14·2 answers
  • Marta, an art director, wants to give feedback to her graphic designer on his logo design. To be effective her feedback should b
    15·2 answers
  • Write a definition in your own words for pixel. Do not copy and paste please.
    5·2 answers
  • Critical Thinking Questions
    15·2 answers
  • The operation of an enable input on a multiplexer chip is.
    14·1 answer
  • Negative numbers are encoded using the __________ technique. a. two’s complement b. floating point c. ASCII d. Unicode
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!