1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blsea [12.9K]
4 years ago
10

When first defining the cloud, NIST gave three service models, which can be viewed as nested service alternatives: software as a

service, platform as a service, and _________ as a service.
Computers and Technology
1 answer:
irakobra [83]4 years ago
6 0

Answer:

Infrastructure.

Explanation:

In Computer science, Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives. It offers individuals and businesses a fast, effective and efficient way of providing services.

Simply stated, Cloud computing are services or programs located on the Internet, they are usually remote resources making use of cloud storage.

When first defining the cloud, National Institute of Standards and Technology (NIST) gave three (3) service models, which can be viewed as nested service alternatives;

1. Software as a Service (SaaS).

2. Platform as a Service (PaaS)

3. Infrastructure as a Service (IaaS).

According to NIST, the five (5) characteristics of a cloud computing service are;

1. On-demand self-service .

2. Broad network access .

3. Resource pooling .

4. Rapid elasticity .

5. Measured service.

Additionally, the cloud service can either be deployed as private, public, hybrid or community service.

You might be interested in
You are implementing a new application control solution. Prior to enforcing your application whitelist, you want to monitor user
shepuryov [24]

Answer: Flag

Explanation:

When using an application control solution, it should be noted that the application whitelist is typically centrally defined which is applied to the network devices. In such case, the applications that are contained in the whitelist will be the only one that are allowed.

Therefore, the applications that are not contained in the whitelist should be flagged. This is necessary in order to effectively monitor the user traffic for a period of time in order to discover user behaviors.

5 0
3 years ago
9. Government and corporate officials concerned about security threats do not bring their own cell phones or laptops when travel
tatuchka [14]

Answer:

True

Explanation:

It is known as Don-Not-Carry rules are implemmented to avoid

-Unauthorized full disk copies (it have been made while the laptop owner was out of the hotel room on overseas travel)

-Laptops steals

- Monitoring by third parties of wireless using.

3 0
3 years ago
In terms of salary and wages, an applicant should:
Roman55 [17]
Address the issue to the employer after being hired.
7 0
4 years ago
Jesse wants to create a website with her company name as the address. What should she do next?
tino4ka555 [31]

E. Purchase the domain name first.

6 0
3 years ago
Briana designs a science fair experiment where she drops a basketball, tennis ball and golf ball from three different heights. S
Nat2105 [25]
A semi-circle is a half circle. Find the area of a semi-circle with a radius of 8.6 meters.

The area of the semi-circle is
3 0
3 years ago
Other questions:
  • A ____ in Excel is like a notebook.
    8·1 answer
  • When using ntfs as a file system, what can be used to control the amount of hard disk space each user on the machine can have as
    8·1 answer
  • Given the char * variables name1, name2, and name3, write a fragment of code that assigns the largest value to the variable max
    15·1 answer
  • With that ------ outlook he doesn't trust anyone.
    11·1 answer
  • Write a program that outputs inflation rates for two successive years and whether the inflation is increasing or decreasing. Ask
    9·1 answer
  • Why is the term RAW image file generally used to describe a variety of file formats, which are sometimes known as digital raw ca
    13·1 answer
  • Write a structured algorithm that prompts the user to input the name and price of an item and the quantity purchased. It should
    10·1 answer
  • 1. Which sentence best expresses the main idea
    12·1 answer
  • There used to be a popular type of pulp book for younger readers. They were called "Choose Your Own Adventure" novels. The idea
    9·1 answer
  • Which event represents an example of social media being used in an
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!