1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
9966 [12]
3 years ago
14

Kyle asked his supervisor which type of computing model was used when the enterprise first started. She explained that the organ

ization purchased all the hardware and software necessary to run the company. What type of model was she describing to Kyle?
A) Virtual services
B) Off premises
C) On premises
D) Hosted services
Computers and Technology
1 answer:
Umnica [9.8K]3 years ago
7 0

Answer:

C) On premises

Explanation:

Based on the information provided within the question it can be said that since the supervisor purchased all the hardware and software necessary to run the company then the type of model that they will use is On-premises. This model focuses on installing all the software and hardware necessary to run the computers within the premises of the company that will be using them.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

You might be interested in
What is the on board storage C:
sasho [114]
On-board? im assuming so. an on-board storage is where people keep luggage/items on a ship.

hopefully i could help ;)
7 0
4 years ago
Do you agree that digital signatures are the best way to protect the data in question?
lutik1710 [3]

Answer:

Explained

Explanation:

Yes, I agree that digital signatures are the best way to protect the data in the date in question. A digital signature is mathematical technique used to validate the authenticity and integrity of a massage. Digital signature is far more inherent security. It is built to solve problems of tempering and impersonation of digital documents. It allows the authorized user to have authentic right, and the unauthorized person is denied access.

3 0
3 years ago
One of your start-ups uses error-correcting codes, which can recover the original message as long as at least 1000 packets are r
Marina CMI [18]

Answer:

Number of packets ≈ 5339

Explanation:

let

X = no of packets that is not erased.

P ( each packet getting erased ) = 0.8

P ( each packet not getting erased ) = 0.2

P ( X ≥ 1000 ) = 0.99

E(x) = n * 0.2

var ( x ) = n * 0.2 * 0.8

∴ Z = X - ( n * 0.2 ) / \sqrt{n*0.2*0.8}   ~ N ( 0.1 )

attached below is the remaining part of the solution

note : For the value of <em>n</em> take the positive number

5 0
3 years ago
) Briefly describe the purpose of the DASH protocol in streaming videos.
Dennis_Churaev [7]

Answer:

The purpose of the DASH protocol in the streaming videos are that it provide the high quality for the streaming media content from the HTTP servers.

DASH stands for the dynamic streaming over HTTP and it is a standard for the steaming over the HTTP that has potential for replacing the various technology. It is basically produces various on demand resources file depending upon the processing power and the bandwidth of the delivery to the clients.

3 0
4 years ago
To annotate a document with a remark for another reviewer to address, select the _____ feature. comments track changes annotatio
kupik [55]
Select the comments feature.

We use comments in our documents to track issues for follow up or make suggestions to other people. A comment is inserted inside a balloon or a box that appears in the document's margins. Whatever the situation you may be in, you can easily add comments in a word document.

 



6 0
3 years ago
Read 2 more answers
Other questions:
  • A Pool charges $4 each visit,or you can buy a membership. Write and solve an inequality to find how many times a person should u
    5·1 answer
  • Queue is the LIFO structure.<br><br> o True<br><br> o False
    8·1 answer
  • Instructions
    12·1 answer
  • a.Write a Python function sum_1k(M) that returns the sumí‘ í‘ = ∑1푘푘푀푀푘푘=1b.Compute s for M = 3 by hand and write
    15·1 answer
  • Which of the following is most likely to be a result of hacking? Group of answer choices slowing of network speed certain Web si
    13·1 answer
  • Assume the availability of a function is_prime. Assume a variable n has been associated with positive integer. Write the stateme
    15·1 answer
  • A group of developers for a startup company store their source code and binary files on a shared open-source repository platform
    14·1 answer
  • How can IT infrastructure be linked to the business strategy of any organization
    9·1 answer
  • Why do you need to put your phone on airplane mode.
    14·1 answer
  • If your computer determines the destination address of a network packet is to a remote network.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!