1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mars1129 [50]
3 years ago
10

Which of these is a popular format for citing sources in academic Works RAM APA CPU or EDU

Computers and Technology
1 answer:
Lelechka [254]3 years ago
6 0

Answer:

APA

Explanation:

You might be interested in
Used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a se
Sati [7]

Answer: A- Public Key Encryption

Explanation: The Public key Encryption is used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private.

7 0
4 years ago
Read 2 more answers
You have an application deployed in Oracle Cloud Infrastructure running only in the Phoenix region. You were asked to create a d
coldgirl [10]

You have an application deployed in Oracle Cloud Infrastructure running only in the Phoenix region. You were asked to create a disaster recovery (DR) plan that will protect against the loss of critical data. The DR site must be at least 500 miles from your primary site and data transfer between the two sites must not traverse the public internet. The recommended disaster recovery plan is

<u>A. Create a new virtual cloud network (VCN) in the Phoenix region and create a subnet in one availability domain (AD) that is not currently being used by your production systems. Establish VCN peering between the production and DRsites.</u>

<u></u>

Explanation:

  • Local VCN peering is the process of connecting two VCNs in the same region and tenancy so that their resources can communicate using private IP addresses without routing the traffic over the internet or through your on-premises network.
  • You have a central VCN that has resources that you want to share with other VCNs.
  • A VCN is a customizable private network in Oracle Cloud Infrastructure. Just like a traditional data center network, a VCN provides you with complete control over your network environment.
  • A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an IP network into multiple, smaller network segments.
  • A VCN resides in a single Oracle Cloud Infrastructure region and covers a single, contiguous IPv4 CIDR block of your choice.

4 0
3 years ago
What traditional responsibilities are removed from an organization when moving to a cloud provider?
Black_prince [1.1K]

The traditional responsibilities removed from an organization when moving to a cloud provider includes;

  • Cloud provider providing system maintenance rather than IT personnel.
  • Responsibility for the provision of storage space will be borne by the cloud provider.
  • The provision of the required level of performance of shared IT hardware.
  • Provision of security for the organization's data will be partly shared.
  • Provision of capital for upgrade and expansion.
  • Reduced responsibility for the provision of space and hardware Universal access route to company sites.

Reasons:

The maintenance of the systems traditionally performed by the

organization is  carried out by the cloud provider.

The storage space requirements for files and shared document are

provided by the cloud provider which results in increased collaboration.

Along with the changing landscape of technology, the cloud provider

ensures the optimum performance IT hardware that is shared by the

employees of the organization.

The Cloud provider ensures the security of the data stored on the cloud as

it is accessed from different devices.

The capital requirement for expansion is borne by the provider

With the use of cloud services, employees can work from home and other

remote locations.

Learn more about cloud services here:

brainly.com/question/25602226

5 0
2 years ago
How do you hack someone's wifi. (Hacker needed)​
Flauer [41]

Answer:

Ask God he knows all

Explanation:

3 0
3 years ago
Read 2 more answers
In Java write a method called wordCount that accepts a String as its parameter and returns the number of words in the String. A
mamaluj [8]

Answer:

// here is code in java.

import java.util.*;

// class definition

class Main

{

   // method that return the number of words in the string

   public static int wordCount(String st)

   {

       /* split the string by space " " delimiter

       and save them into  string array*/

       String[] no_words=st.split(" ");

       // find the length of array

       int len= no_words.length;

       //return the length

       return len;

   }

   // driver function

public static void main (String[] args) throws java.lang.Exception

{

   try{

    // scanner object to read input string

       Scanner s=new Scanner(System.in);

        // string variable

       String str;

       //ask user to enter string

       System.out.print("please enter the string: ");

       // read the string from user

       str=s.nextLine();

       // call the function with string parameter

      int tot_words= wordCount(str);

      // print the number of word in string

      System.out.println("total words in the string is : "+tot_words);

   }catch(Exception ex){

       return;}

}

}

Explanation:

Read a string from user with the help of scanner class object.Call the function

wordCount() with string parameter.Here split the string by space " " delimiter.

Save the words into a string array.Find the length of the array and return it.

Then in the main print the number of words in the input string.

Output:

please enter the string: this string has wide spaces

total words in the string is : 5

5 0
4 years ago
Other questions:
  • When you first turn on a computer and you don’t hear a spinning drive or fan or see indicator lights, is the problem hardware or
    13·1 answer
  • What two features distinguished Windows 2.0 from Windows 1.0?
    5·1 answer
  • Each object that is created from a class is called a(n) ____________ of the class.
    5·2 answers
  • Which of the following is the amount of space available on a screen to display information?
    8·1 answer
  • Sabiendo que el engranaje motriz tiene 14 dientes y gira a 4000 RPM, y el conducido tiene 56 dientes, responde:
    11·1 answer
  • URGENT!! Ronald wants to search for an image of a sports car. Ronald doesn’t have to remember the specific name of the image to
    5·1 answer
  • In the Remote Access Domain, if private data or confidential data is compromised remotely, you should set automatic blocking for
    15·1 answer
  • You are the IT Administrator for the CorpNet.local domain. You are in the process of implementing a group strategy for your netw
    13·1 answer
  • Đánh giá hoạt động thanh toán điện tử của sinh viên
    6·1 answer
  • Hey does anyone know any sites like you tube i can watch on my school chrome book or tell me how to unblock sites cause everythi
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!