1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zmey [24]
3 years ago
6

With ______________, the cloud provider manages the hardware including servers, storage, and networking components. The organiza

tion is responsible for all the software, including operating system (and virtualization software), database software, and its applications and data.
Computers and Technology
1 answer:
EastWind [94]3 years ago
7 0

Answer:

Infrastructure as a service

Explanation:

With infrastructure as a service, the cloud provider manages the hardware including servers, storage, and networking components. The organization is responsible for all the software, including operating system (and virtualization software), database software, and its applications and data.

You might be interested in
Describe how data center storage applications drive the development of SAN technology.
Ede4ka [16]

Answer:

 The storage area network basically apply in the networking model for storage various application in the data center. The storage area network (SAN) provide the common pathway between the server and the storage device.

The storage area network technology basically implemented in the fiber channel configuration over the ethernet. SAN provide access to the data that shared by the personal resources. It is basically simple and dedicated network which provide for the data storage.

 

5 0
3 years ago
Need help please asap
Nitella [24]

Answer:

Its C that is the answer hahahahha

6 0
3 years ago
Who has played pokemon red, blue, or yellow on the gameboy
lisov135 [29]

Answer:

I didn't think this would be an actual question... I did- :3

3 0
3 years ago
Read 2 more answers
Which of the following is the biggest issue facing wireless communication today?
anygoal [31]

Answer:

threats to privacy

Explanation:

7 0
3 years ago
Simpson is trying to solve an equation related to converting a decimal number to its hexadecimal form. He decides to utilize the
Marina86 [1]
Divide 1210 by 16  and write reminder divide until value zero 

first step divide 1210 by 16 =  10 
then 75 divide by 16 =  11
4 

we can write 4 B A 
in hexadecimal 

4 0
3 years ago
Other questions:
  • You send a report to your boss for feedback and she returns it to you with her edits noted in the electronic file. This Word fea
    11·1 answer
  • The following 2D array has been created:
    12·2 answers
  • What is the process of comparing data with a set of rules or values to find out if the data is correct?
    8·2 answers
  • A two-dimensional array can be viewed as ___________ and _____________.
    10·1 answer
  • Which of the following involves writing hidden messages so that only the sender and intended recipient know a message exists? St
    5·1 answer
  • What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f
    10·2 answers
  • What is data? why is it important to collect data ? explain the points.​
    10·1 answer
  • Which statements about editing an existing Contact in Outlook are true? Check all that apply.
    9·2 answers
  • Question 4 A data analyst wants to include a line of code directly in their .rmd file in order to explain their process more cle
    10·1 answer
  • Data elements in a relational database are organized into ____
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!