based off my knowledge im gonna to go with OPTION A because ur social security number holds information like your brith etc
When was the Ming dynasty established?
the 1100s CE
the 1200s CE
the 1300s CE
the 1400s CE
Answer:
The appropriate response is "Cloud bursting".
Explanation:
- A strategy for the implementation of a program in a proprietary cloud or network infrastructure that explodes onto a public cloud if availability or production for computational power increases, could be considered Cloud bursting.
- It enables extra cloud capabilities throughout cases where additional facilities have been required.
The alternative to Encapsulating Security Protocol (ESP) is Authentication Header (AH). Hope this helped!
Answer:
The program to this question can be describes as follows:
Program:
#include <stdio.h> //defining header file
int main() //defining main method
{
int n,i,x=0; //defining integer variable
printf("Enter a number: "); //print message
scanf("%d",&n); //input value from the user
printf("%d\n",n); //print input value
for(i=1;i<n;i++) //loop to count reverse number
{
x=n-i; //calculate value
printf("%d\n",x); //print value
}
return 0;
}
Output:
Enter a number: 3
3
2
1
Explanation:
- In the above program, three integer variable "n,i and x" is declared, in which variable n we take input from the user end and the variable i and x is used in the loop to calculate the value in the reverse order.
- In the next step, a loop is declared, in which the variable x calculates the value in reverse order and uses a print method to print its value.