1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Goshia [24]
2 years ago
11

As defined by the National Institute of Standards and Technology​ (NIST), "________ is a model for enabling​ ubiquitous, conveni

ent,​ on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider​ interaction."
Computers and Technology
1 answer:
hram777 [196]2 years ago
5 0

Answer:

Cloud Computing

Explanation:

It is certainly a model for enabling ubiquitous, on-demand and convenient network access for using a shared pool of configurable computing resources, and that can rapidly be provisioned as well as released with the least managing effort or the interaction of the service provider. And such a facility is only being provided by the cloud computing currently. And hence the Cloud computing, the right answer.

You might be interested in
Write a loop that fills an array int values[10] with ten random numbers between 1 and 100. Write code for two nested loops that
zalisa [80]

Answer:

#include <iostream>

#include <cstdlib>

using namespace std;

int main() {

   int[] array = new int[10];

   int index = 0;

   while(index < array.size()){

           int number = (rand() % 100) + 1;

           for (int i = 0; i < 1; i++) {

               array[index] = number;

               cout<< "Position "<< index << "of the array = "<< number << endl;

               ++index;

           }

     }

}

Explanation:

The while loop in the source code loops over a set of code ten times, The for loop only loops once to add the generated random number between 1 and 100 to the array of size 10. At the end of the for loop, the index location and the item of the array is printed out on the screen. The random number is generated from the 'rand()' function of the C++ standard library.

7 0
2 years ago
. is the language that Web pages are written in?(PHP,XML,HTML,Javascript)
dalvyx [7]

Answer:

<em>HTML</em><em>(</em><em>hypertext</em><em> </em><em>markup</em><em> </em><em>language</em><em>)</em><em> </em>is the language that Web Pages are written in.

4 0
3 years ago
Read 2 more answers
A state university locks in costs for a student once a student starts attending the university. The total cost is $24,500. A stu
zlopas [31]
10,700+5000+1600=17,300
24,500-17,300=7,200
7,200/10=
$720.00 will need to be saved every month.
6 0
3 years ago
Read 2 more answers
DSSS uses a chipping code to encode redundant data into the modulated signal. Which two of the following are examples of chippin
Schach [20]

Answer:

Option A and Option D

Explanation:

5 0
3 years ago
How many bits are required to store the text of the number 150 in ascii?
kaheart [24]
The correct answer of the given question above would be 24 BITS. The number of bits that are required to store the text of the number 150 in ASCII would be 24 bits. ASCII means American Standard <span>Code for Information Interchange. Hope this answer helps. </span>
7 0
3 years ago
Read 2 more answers
Other questions:
  • Candace opened an email from a person she didn't know and clicked on a pop-up in the email that installed a virus on her compute
    8·2 answers
  • Create a funtion makeStudent(studentlist) where studentlist is your list of Student namedtuples The function should do the follo
    13·1 answer
  • 1. Mobile devices have a _________ viewport that displays a web page content that fits within a mobile screen.
    11·1 answer
  • To add text into a SmartArt graphic, a user will need to _____.
    14·1 answer
  • Security and protection as it relates to operating systems is grouped into four categories: Availability, Data integrity, Authen
    9·1 answer
  • A tool you might use to manipulate an image, such as a photograph, into a seamless repeating texture would be:
    7·2 answers
  • Does anyone know this page for drivers ed?
    9·1 answer
  • What is used to configure data sources for applications that require access to a database?
    14·1 answer
  • Suppose x and y are int variables and ch is a char variable. Consider the following input: 5 28 36 What value (if any) is assign
    11·1 answer
  • When performing forensics on an Apple computer, what operating system are you the most likely to encounter QUIZLET
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!