1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Semmy [17]
3 years ago
15

________ takes place when a firm contracts custom software development or maintenance of existing legacy programs to outside fir

ms. Utility computing Consumerization of IT Cloud computing Outsourcing On-demand computing
Computers and Technology
1 answer:
inessss [21]3 years ago
6 0

Answer:

outsourcing

Explanation:

<u>outsourcing</u> takes place when a firm contracts custom software development or maintenance of existing legacy programs to outside firms. Utility computing Computerization of IT Cloud computing Outsourcing On-demand computing

You might be interested in
How is a Creative Commons license different from a regular copyright?
gayaneshka [121]

Answer:

Creative Commons is actually a license that is applied to a work that is protected by copyright. It's not separate from copyright, but instead is a way of easily sharing copyrighted work. ... Copyright confers some pretty heavy duty protections so that others don't use your work without your permission.

Explanation:

8 0
3 years ago
What does this button do?
Studentka2010 [4]
It circulated air around the car
4 0
4 years ago
Return true if the given non-negative number is a multiple of 3 or 5, but not both. Use the % "mod" operator.
Pani-rosa [81]

the following C++ function will return true if the given non - negative number is multiple of 5 or 3 else it will return false.

bool function( int x ){

// variable to check if it is multiple of both or not

int number =0;

if(3%x == 0){

number++;

}

if(5%x == 0){

number++;

}

// Now returning by deciding

if( number <=1)

return true;

else

return false

}

4 0
4 years ago
Array Challenge Have the function ArrayChallenge (arr) take the array of numbers stored in arr and return the string true if any
vampirchik [111]

Answer:

The code is given as follows,

Explanation:

Code:

#include <stdio.h>

#include <string.h>  

int n; //to store size of array  

char* ArrayChallenge(int arr[]) //function returns string true or false

{

  int i, j;

  int sum = 0;

  for(i = 0; i < n; i++)

  {

      sum = sum + arr[i]; //count sum

  }  

  for(i = 0; i < n; i++)

  {

      for(j = i+1; j < n; j++) //loop for every two elements in array

      {

          if(arr[i]*arr[j] > 2*sum) //check if proudct of two elements > 2 times sum

          {

              printf("\n%d x %d = %d, 2xSum = %d\n", arr[i], arr[j], arr[i]*arr[j], 2*sum);

              return "true"; //If proudct of two elements > 2 times sum. return true

          }

      }

  }

  return "false"; // If proudct of two elements < 2 times sum. return false

}  

int main()

{  

  printf("\nEnter size of array: ");

  scanf("%d", &n); //read size of array

  int A[n]; //array of size n

  printf("\nEnter array elements: ");

  int i;

  for(i = 0; i < n; i++)

  {

      scanf("%d", &A[i]); //read array from stdin

  }

  printf("%s\n",ArrayChallenge(A)); //ccall function and print answer

 

  return 0;

}

6 0
3 years ago
Which of the following is the definition of red team?
marysya [2.9K]

Answer:

a. An open source port scanning and host detection utility. In a penetration test, this consists of penetration testers who have been given some background knowledge of the infrastructure.

Explanation:

b. Red team is special for checking to penetration test and there is no defend

c. They are not aware that penetration test is happening

d. The process is to check system security infrastructure by trying different types of penetration in unexpected ways.

a. <em>There is a special team created as called Red Team that they try to penetrate to the system with different methods. This test is longer and different then normal tests to detect is a system giving an alert for any action damaging to the system.</em>

3 0
3 years ago
Other questions:
  • Many people view drug and alcohol abuse as a social problem.<br> A. TRUE<br> B. FALSE
    9·1 answer
  • Which of the following are advantages of a local area network, as opposed to a wide area network? select three options
    15·1 answer
  • An IT company revises its process parameters in response to complaints from vendors that products were not ready on time. This w
    15·1 answer
  • 30 POINTS!!!
    9·2 answers
  • When a CPU executes each instruction in a program, it uses a process known as the __________.
    15·1 answer
  • Which device makes telecommunications possible?
    9·1 answer
  • When engineers consider _____, they propose giving up a benefit of one proposed design in order to obtain a benefit of a differe
    14·1 answer
  • Rick is teaching a photographic worship about sun color and image. He shows the students a few images to teach them about contra
    12·1 answer
  • Which of the following is true about named ranges?
    6·1 answer
  • Briefly explain the conceptual of effective computer based instruction for adults outlining the three units output process and i
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!