1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stepladder [879]
3 years ago
11

Ryan is looking at investment opportunities as a cloud service provider. He wants to invest in a deployment-based cloud model th

at provides all services. Which cloud computing model should he opt for?
A. community
B. communication
C. infrastructure
D. software
Computers and Technology
2 answers:
andreyandreev [35.5K]3 years ago
7 0

Answer:it c

Explanation:i hoped i helped

BaLLatris [955]3 years ago
3 0

Answer

Infrastructure

Explanation

Cloud computing is the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.

Infrastructure as a service  cloud computing model is the best service Ryan should use basically because it s the one which will provide services which allows the users to access to computing services and resources such as servers,storage,networking and other fundamental computing resources.

You might be interested in
Shawn works at the local electrical company in Nampa, ID, which provides electricity to the entire city of Boise. This area is p
nexus9112 [7]

Answer:

D. Fault tolerance

Explanation:

  • Fault Tolerance basically refers to the feature or capability of a  system to keeps on working and performing its operations without interruption in case of a failure.
  • This failure can be the failure of one or more of its components.
  • This is beneficial as the system does not stop working or fail completely.
  • It provides copies of the same system or backup components which can be used when the existing system fails and prevents the loss of information and services.
  • Accessibility  refers to provide equal services for everyone who uses a system. So its not a correct option.
  • Moore’s law states that the computing speed and power will double every two years so its not a correct option as well.
  • Anti virus is a software to identify, prevent and remove viruses and malware so it is not a correct option as well.

3 0
3 years ago
What term is used for a seemingly harmless program that has malicious code hidden inside?
Delicious77 [7]
That is none other than a "Trojan Horse"
8 0
3 years ago
Which of the following is a use for a honeynet? A. Detecting network attacks and scans B. Slowing down attackers C. Concealing n
inn [45]

Answer:

A. Detecting network attacks and scans

Explanation:

Honeynet

It is a network , which is set up with the intentional vulnerabilities , in order to invite the attack , in order to determine and study the activities of the attacker .

The Honeynet is composed of one or more honey pots , which are just the computer systems , which act as a bait to trap the people who , tries to hack or penetrate into other's computer system .

Hence ,

The correct option is Detecting network attacks and scans .

5 0
3 years ago
Which of the following situations best illustrates the process of authentication?a.A Web site sets users' passwords to expire ev
Paladinen [302]

Using an electronic signature on official documentation best illustrates the process of authentication

Further explanation:

The continuous rise of Electronic signatures has made it easier for people to accept signed documents by email or through electronic devices. One good example of electronic signatures is the implementation of digital signatures which broadly encompasses many types of electronic signatures out there. Digital signatures are unique to each signer and follow a standard authentication protocol called PKI. PKI use mathematical algorithms to generate what are known as private and public keys.

A good example is Bob and Jane. Jane sends an eSignature document using her private keys. Bob receives this document with an attached copy of Jane’s public key. The signature will be considered valid if the public key decrypts the signature correctly.

Learn more about eSignatures and electronic signatures.

brainly.com/question/8776017

#LearnWithBrainly

7 0
3 years ago
When you try to boot your computer it hangs after post?
Likurg_2 [28]
What are you trying to ask...
4 0
3 years ago
Other questions:
  • Which statements describe the advantages of using XML?
    12·2 answers
  • Twitter is an example of a __________. social bookmarking website social tagging website microblogging website blogging website
    12·1 answer
  • To create a new folder, press ____.
    12·1 answer
  • Please Help!!!<br> I keep getting this answer wrong
    10·1 answer
  • 1. What are the advantages and disadvantages of technology in communication?
    9·2 answers
  • One of the benefits of holding an investment for over a year rather than selling it in less than a year is that the
    14·2 answers
  • Tina reported a safety hazard at her workplace to OSHA. Representatives from OSHA came to her work and inspected the issue, then
    14·1 answer
  • __________ implements a security policy that specifies who or what may have access to each specific system resource and the type
    8·1 answer
  • What is the difference between auto fill and fill handle ?​
    7·1 answer
  • What do you mean by Graphics editing​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!