1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Karo-lina-s [1.5K]
3 years ago
12

An online service allows users to integrate their phonebook with their social media profiles and stores it on the cloud. The pho

nebook is updated with pictures of contacts when they are uploaded on social media sites. Which of the following cloud-based offerings is being provided to the users?a) software as a service (SaaS)b) Platform as a service (PaaS)c) Infrastructure as a service (IaaS)
Computers and Technology
1 answer:
Tasya [4]3 years ago
6 0
A) Software as a Service (SaaS)

SaaS refers to full applications deployed in the cloud, whereas PaaS and IaaS refer to cloud services that allow for development of new applications with varying levels of hardware abstraction. IaaS usually refers to cloud Virtual Machines, and it allows more control over the types of computers used to run an application (Linux/Windows/RAM/CPUs/etc). PaaS is a set of minimum required components to make an application run, typically not visible to developers. Developers can write code and deploy to a PaaS service without configuring virtual machines or installing dependencies/Operating Systems.
You might be interested in
If a speaker repeats a point, it is likely _____.
zloy xaker [14]

I’m pretty sure it’s either A or D

4 0
3 years ago
Read 2 more answers
To ease giving access to network resources for employees, you decide there must be an easier way than granting users individual
scoundrel [369]

Answer

The intranet security model

Explanation:

This is an enterprise system that processes user information for security  and access authentication. It prevents unauthorized users, who are not part of the network resources from capturing these information.

The intranet security model is an efficient security procedure that incorporates web security  access control in keeping information safe over the intranet. It is also useful in encryption and decryption techniques.

4 0
3 years ago
You are unpacking and setting up workstations
Anestetic [448]

Answer:

For setting up workstations in classrooms, one end of cables connected into the built in NIC and other end will be connected to a drop.

Explanation:

A drop will be used for connectivity in this case, which will work as connection point in a network. Drops are just like outlets in wall having  Ethernet Jacks where a network device or system can be plugged into it.

8 0
3 years ago
Host A sends two UDP segments to Server S, one to port 1234 and the other to port 2345. Host B sends one UDP segment to Server S
SOVA2 [1]

Answer:

A

Explanation:

8 0
3 years ago
Each wireless network has its own name to identify it, known as service set identity. true false
Dominik [7]
True. The acronym for service set identity is SSID, which you've likely saw before. And like you say, it's simply the unique name given to a wireless network so that we are able to identify what network we are connecting to.
8 0
3 years ago
Other questions:
  • Where does the term for a star network describe? A) a network for Department of Defense scientists to share data about the stars
    13·2 answers
  • Which ipv6 prefix will the typical enterprise network receive from the service provider?
    12·1 answer
  • What is a seismogram?
    9·1 answer
  • Which type of styles can be applied to a word, phrase, or sentence?
    7·1 answer
  • Your team will write a function that reverses a C-string, to practice using pointers. You must use pointers and C-strings for th
    6·1 answer
  • The quicksort pivot value should be the key value of an actual data item; this item is called the pivot. True or False?
    11·1 answer
  • Importance of type casting in programming ​
    5·1 answer
  • Define the instance method inc_num_kids() for PersonInfo. inc_num_kids increments the member data num_kids. Sample output for th
    6·1 answer
  • Sarah used a grid to create this layout for a website. Which rule of composition did Sarah use for the grid?
    7·2 answers
  • Pleaseee help me with the typical situations of the icons(i already know for words but I have no idea for giving the situations
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!