1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
luda_lava [24]
3 years ago
14

What are the business drivers of cloud computing?(Choose all that apply.)

Computers and Technology
1 answer:
Xelga [282]3 years ago
7 0

Answer:  The applicable answers are b, c, and d.

Explanation:

When a company decides to hire the services of a cloud computing service provider, instead of investing in purchasing the resources needed in order to match its needs, as the cloud model is based on the concept "pay as you go", it allows to maximize the costs efficiency, and at the same time, gives the company the choice to define what type of steps are needed to grow, and when it is advisable to go beyond.

Finally, as it is possible to expand the services hired on the fly very easily, it is a very good way to be sure that it will never ran out of resources, no matter that future needs could be.

Actually, the only answer that is wrong is a) because it happens just the opposite: Cloud services allow to decrease time to market substantially.

You might be interested in
For an external usb hard drive attached to a computer, which is more suitable: a writethrough cache or a block cache
Charra [1.4K]

Disk access is way slower than memory access. Caching is a technique to improve the disk access time.  Block cache is a caching technique which reduces disk accesses time.  Here a portion of disk is bought to cache for reading and a modified blocks are first changed in cache but reflected in the disk at one go.  On the other hand with write through caching each modified block is written to cache and at the same time it is written to the disk.  Write- through caching requires more disk I/O so they can have a negative effect on the performance. 

6 0
3 years ago
Read 2 more answers
What activities are the most likely to infect your computer vith a virus? Check all that apply.
Gnesinka [82]

Answer:A,B,E

Explanation:

I just took the quiz

5 0
3 years ago
Host Y sends the first TCP ACK message for the transaction?<br><br> a. true<br><br> b. false
kupik [55]

Answer: True

Explanation:

 TCP is the transmission control protocol which and TCP ACK is the transmission control handshake method which are used by TCP. It basically indicates the next sequence number in the method when the flag is set.

Firstly, the ACK (Acknowledge) send by the each end for the initial sequence number itself but it does not contained any type of data. In the TCP segment header ACK contain 32 bit field.

The acknowledgement is just a proof to clients that ACK is a specific to the SYN when the clients initiate.

 

8 0
3 years ago
What name is given to any changes to the original data such as users manually modifying data, programs processing and changing d
nadezda [96]

Modification is the name given to an attack that makes changes into original data such as users manually modifying data, programs processing and changing data, and equipment failures.

In modification attacks, only changes are made to original data without deleting it completely. Modification is basically a type of attack in the context of information security. This type of attack creates annoying situations and discords by altering existing data in data files, inserting new false information in the network and reconfiguring network topologies and system hardware.

Modification attack is mainly mounted against sensitive and historical data. Modification attacks target integrity of the original data with an intent of fabricating it.

You can learn more about ha-cker attack at

brainly.com/question/14366812

#SPJ4

3 0
1 year ago
Match the following
kakasveta [241]

Answer:

Eraser tool -removes the unwanted part of the drawing.

Row -horizontal space running from left to right.

Text -Primary component of a multimedia.

Drawing Area -Working are of ms point program.

I hope this helps!! Correct me plz if I'm wrong. If I'm right, could you mark me as brainliest?

8 0
2 years ago
Other questions:
  • An employee is angry with his boss and wants to sabotage the company. To accomplish this he secretly changes some of the values
    7·1 answer
  • As yall know its spoopy season. This means spoopy music! I am having a live stream on the Spoon app under the username teendrago
    11·1 answer
  • Click to move a stacked object to the top of the stack?
    8·1 answer
  • Each webpage is assigned a(n) ______, an address that identifies the location of the page on the Internet.
    6·1 answer
  • keeping in mind the role in order of precedence plays in equations, what would excel display as the result of the following equa
    14·1 answer
  • Divide 111001 by 1101​
    7·1 answer
  • Which of the following variable names follows the rules for naming variables?
    13·1 answer
  • HELP PLZZZZZZ
    10·1 answer
  • When entering information for a new contact in the address book, Outlook will automatically create a _____. A. Invitation B. Res
    7·1 answer
  • What is software?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!