1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
luda_lava [24]
3 years ago
14

What are the business drivers of cloud computing?(Choose all that apply.)

Computers and Technology
1 answer:
Xelga [282]3 years ago
7 0

Answer:  The applicable answers are b, c, and d.

Explanation:

When a company decides to hire the services of a cloud computing service provider, instead of investing in purchasing the resources needed in order to match its needs, as the cloud model is based on the concept "pay as you go", it allows to maximize the costs efficiency, and at the same time, gives the company the choice to define what type of steps are needed to grow, and when it is advisable to go beyond.

Finally, as it is possible to expand the services hired on the fly very easily, it is a very good way to be sure that it will never ran out of resources, no matter that future needs could be.

Actually, the only answer that is wrong is a) because it happens just the opposite: Cloud services allow to decrease time to market substantially.

You might be interested in
What is a special class of adware that collects data about the user and transmits it over the Internet without the user’s knowle
Stells [14]

Answer:

The answer is "Spyware".

Explanation:

Spyware is a supplementary program that is mounted on your customer computer and it transmits the data without authorization via the Internet. Its business includes ads, private data, and improvements in the user interface, which is why it has become recognized as the special adware class that collects and transmits user information over the web without the user's permission.

7 0
3 years ago
____________________deals with syntax and semantics ofinformation exchange.
Goshia [24]

Answer:

The answer is (a).Presentation Layer

Explanation:

This layer is located at the 6th level of the OSI model, responsible for delivering and formatting the information to the upper layer for further processing. This service is needed because different types of computer uses different data representation. The presentation layer handles issues related to data presentation and transport, including encryption,translation and compression.

3 0
2 years ago
A college team's BCS football ranking is comprised of three elements:1) the Harris Poll score, 2) the Coaches Poll score, and 3)
artcher [175]

Answer:

harris_poll_ranking = int(input("Enter team's Harris Poll ranking [1 - 2,850]: "))

coaches_poll_ranking = int(input("Enter team's Coaches Poll ranking [1 - 1,475]: "))

computer_ranking  = float(input("Enter team's computer ranking  [0 - 1]: "))

harris_poll_score = harris_poll_ranking / 2850

coaches_poll_score = coaches_poll_ranking / 1475

bcs_score = harris_poll_score / 3 + coaches_poll_score / 3 + computer_ranking / 3

print(bcs_score)

Explanation:

*The code is in Python.

Ask the user to enter the  harris_poll_ranking as int, coaches_poll_ranking as int and computer_ranking as float

Calculate the harris_poll_score, divide the harris_poll_ranking by 2850

Calculate the coaches_poll_score, divide the coaches_poll_ranking by 1475

Calculate the bcs_score, harris_poll_score, coaches_poll_score and computer_ranking by 3 and sum them

Print the bcs_score

6 0
3 years ago
Which part of the computer stores and processes data?
lilavasa [31]

it is A the hardware im pretty sure but dont put my answer in im not completley sure

3 0
3 years ago
Assignment RequirementsYou have been working as a technology associate in the information systems department at Corporation Tech
garik1379 [7]

Answer:

hola me llamos por mi nombre

Explanation:

me gusta la tegnologia

y no e trabajado xq soy estudiamte aun

7 0
3 years ago
Other questions:
  • Which of the following is an example of subjunctive verb mood?
    5·1 answer
  • In distributed dos attacks, the attacker sends messages directly to ________. bots the intended victim of the dos attack backdoo
    7·1 answer
  • ​PeroxyChem's IT staff was able to free its IT staff to spend less time on routine maintenance and more time on strategic tasks
    11·1 answer
  • Given the variable ip, already declared as a pointer to an integer, write the code to dynamically allocate memory for a single i
    15·1 answer
  • Which of the following best explains the different between Cut and Copy? a. When you copy text you are permanently deleting it,
    5·2 answers
  • What will the following code print out: int numbers [] = {99, 87, . 66, 55, 101}; for (int i = 1; i < 4; i++) cout << n
    11·1 answer
  • How are actual rocket launches similar to how balloon rockets and canister rockets launch?
    6·1 answer
  • Describe how a computer checks whether the image just taken by the camera matches the scanned photograph.
    12·1 answer
  • How do we explain the difference between fake news and facts​
    8·1 answer
  • Computer always produces wrong output true or false<br>​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!