1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Usimov [2.4K]
3 years ago
6

If a journalist is caught making up quotes, which

Social Studies
1 answer:
soldier1979 [14.2K]3 years ago
7 0

Answer:

Thay will be fired and it will be hard to find another job.

You might be interested in
The Aryan migration began its spread into India through the Indus River Valley mainly because that area
castortr0y [4]
So basically the Syrian are Jewish people and Asia is in Israel so Palestine has a huge
5 0
3 years ago
What is a light vehicle rowed by a paddle called??
kati45 [8]

I believe the answer is: Canoe

Until the development of ships in mid 1800s, Canoes were the main method of transportation for those who want to pass watery region ( Rivers or lake)

In current years the usage of canoe is is restricted to sports (it's included in olympic) or for tourism purposes.

7 0
4 years ago
Read 2 more answers
Population destiny is the number of people that live in a region divide by the number of
ElenaW [278]

(B. ) Square Miles or Kilometers in the Region


To calculate the population density of an area you would divide the number of people by land area in either square miles or kilometers.

3 0
3 years ago
Wich state in the united states is located at 150 W longitude
kvv77 [185]
ANSWER:

The state in the United States of America which is located at 150 W longitude is: Alaska.
7 0
4 years ago
To examine a cloud environment, you must have the latest knowledge on cloud encryption. Conduct online research, and write a two
Rudik [331]

Answer:

Cloud encryption is a help offered by distributed storage suppliers whereby information, or content, is changed utilizing encryption calculations and is then put on a capacity cloud.  

Cloud encryption is the change of a cloud administration client's information into ciphertext. Cloud encryption is practically indistinguishable from in-house encryption with one significant contrast - the cloud client must set aside some effort to find out about the supplier's strategies and methods for encryption and encryption key administration. The cloud encryption abilities of the specialist co-op need to coordinate the degree of affectability of the information being facilitated.  

Since encryption devours more processor overhead, many cloud suppliers will just offer essential encryption on a couple of database fields, for example, passwords and record numbers. Right now, having the supplier encode a client's whole database can turn out to be costly to the point that it might bode well to store the information in-house or scramble the information before sending it to the cloud. To minimize expenses, some cloud suppliers have been offering options in contrast to encryption that don't require as a lot of preparing power. These procedures incorporate redacting or muddling information that necessities to stay secret or the utilization of exclusive encryption calculations made by the seller.  

Before, numerous organizations felt happy with permitting the cloud supplier to oversee encryption keys, accepting that security dangers could be overseen through agreements, controls and reviews. After some time it has gotten obvious, notwithstanding, that cloud suppliers can't respect such responsibilities when reacting to government demands for data.  

Stage as an assistance (PaaS) is a distributed computing model in which an outsider supplier conveys equipment and programming apparatuses - as a rule those required for application advancement - to clients over the web. A PaaS supplier has the equipment and programming on its own foundation. Accordingly, PaaS liberates clients from introducing in-house equipment and programming to create or run another application.  

PaaS engineering and how it functions  

PaaS doesn't ordinarily supplant a business' whole IT framework. Rather, a business depends on PaaS suppliers for key administrations, for example, application facilitating or Javadevelopment.  

A PaaS supplier constructs and supplies a versatile and advanced condition on which clients can introduce applications and informational collections. Clients can concentrate on making and running applications instead of developing and keeping up the basic framework and administrations.  

Numerous PaaS items are designed for programming advancement. These stages offer register and capacity foundation, just as word processing, rendition the executives, ordering and testing administrations that assist designers with making new programming all the more rapidly and proficiently. A PaaS item can likewise empower improvement groups to team up and cooperate, paying little mind to their physical area.  

PaaS upsides and downsides  

The chief advantage of PaaS is straightforwardness and comfort for clients - the PaaS supplier supplies a significant part of the framework and other IT administrations, which clients can get to anyplace by means of an internet browser. PaaS suppliers at that point charge for that entrance on a for every utilization premise - a model that numerous endeavors like, as it kills the capital costs they generally have for on-premises equipment and programming. Some PaaS suppliers charge a level month to month expense to get to their administration, just as the applications facilitated inside it.  

Framework as an assistance (IaaS) is a type of distributed computing that gives virtualized processing assets over the web. IaaS is one of the three primary classifications of distributed computing administrations, close by programming as a help (SaaS) and stage as an assistance (PaaS).  

IaaS engineering and how it functions  

In an IaaS model, a cloud supplier has the foundation segments generally present in an on-premises server farm, including servers, stockpiling and systems administration equipment, just as the virtualization or hypervisor layer.  

7 0
4 years ago
Other questions:
  • How might a political action committee influence government?
    5·1 answer
  • Because of the divorce rate in our nation, nearly three-fourths of american children will
    11·1 answer
  • Linda's classified email was intercepted by a Russian Foreign Intelligence Entity, although this was not her intention. Did Lind
    8·1 answer
  • Which is most true of Jim Crow laws?
    7·2 answers
  • Lobbying refers to:​ a. ​ the attempts to shape public opinion through online campaigns. b. ​ the evaluation of performance of l
    13·1 answer
  • Adam Smith is regarded as the father of A Marxism B. modern economics Cmixed market economics D. the socialist movement Please s
    12·2 answers
  • Which country are most control in southwest Asia
    13·1 answer
  • Why was Alexander Hamilton considered a Federalist?
    14·2 answers
  • Conversion disorder symptoms generally appear ______________. Group of answer choices in children following a physical injury to
    11·1 answer
  • Positive psychology, which studies the ideas behind human flourishing, is connected to which psychologist?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!