1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
professor190 [17]
2 years ago
12

Which cloud computing element that gives a service provider the ability to dynamically allocate shared physical resources to mul

tiple customers based on each customer's usage demand?
Computers and Technology
1 answer:
borishaifa [10]2 years ago
5 0

Answer:

Resource Polling is the correct answer to the given question .

Explanation:

The Resource pooling is used in cloud computing frameworks that describe a situation where companies offer temporary and flexible resources to different clients .In the resource polling the programs can be changed to fit the needs of each client without making any adjustments visible to the client.

The main function of resource pooling that it grants a service provider the opportunity to dynamically allocate common physical resources to different clients based on the utilization criteria of each client.

You might be interested in
What are the programs in a computer​
stealth61 [152]

Answer:

Computer skills examples

Operating systems  

Office suites  

Presentation software

Spreadsheets  

Accounting software

Explanation:

A program is a set of ordered operations for a computer to do in computing. The program in the modern computer described by John von Neumann in 1945 has a one-at-a-time series of instructions that the computer follows. Typically, the application is saved in a computer-accessible storage location.

4 0
2 years ago
Which protocol below is used to email clients to send email
AVprozaik [17]

The Internet Message Access Protocol (IMAP) is a mail protocol used for accessing email on a remote web server from a local client. IMAP and POP3 are the two most commonly used Internet mail protocols for retrieving emails

4 0
3 years ago
What layer is responsible for routing messages through an internetwork in the tcp/ip model?
Paul [167]

Answer:

<h2>The TCP/IP model consists of four layers: application, transport, internet, and network access. Of these four layers, it is the internet layer that is responsible for routing messages.</h2>
4 0
2 years ago
Which of these are characteristics of a Python data type? Check all that apply.
Lorico [155]

Answer:

A Python data type is weakly typed.

A Python data type can have numeric values.

A Python data type can be shown by keys and values within brackets [ ].

A Python data type can be a string, a list, or a tuple with items that can be repeated using the asterisk ( * ).

A Python data type can be a dictionary that can be updated, changed, or removed.

Aka A B C E F

4 0
3 years ago
Paavo was reviewing a request by an executive for a new subnotebook computer. The executive said that he wanted USB OTG support
grandymaker [24]

Answer:

Connecting a mobile device as a peripheral to an infected computer could allow malware to be sent to that device.

Explanation:

Since in the question it is mentioned that Paavo reviewed a request by an executive for subnotebook computer i.e new. but he needs to USB OTG support so it is a  USB i.e on the go that links the devices from one device to another

Therefore by links the mobile device to the computer i.e infected that allows malware we called virus so that we are able to send it to that device. By this,  he wants to tell about the USB OTG security

4 0
3 years ago
Other questions:
  • The main benefit of encryption of a hard drive is to make part of an ROI report.
    15·1 answer
  • In _____ conversion of the implementation phase of the systems development life cycle (SDLC), the old and new systems run simult
    9·1 answer
  • Does an android tablet have a hard drive
    7·1 answer
  • Password combined with pin used as an authentication requirement is an example of:
    6·1 answer
  • If you want to adjust the width of a column manually, move your mouse over the _______ column boundary and click and drag until
    9·1 answer
  • The famous study entitled ""Protection Analysis: Final Report"" focused on a project undertaken by ARPA to understand and detect
    14·1 answer
  • A representation of something by using a description, summary or image.
    7·1 answer
  • Please Help Me!!!!!!!!!!!!!
    5·1 answer
  • Why does every image on brainly look like this too me?? it started today
    15·2 answers
  • Write a program that reads a file that contains only integers, but some of the integers have embedded commas, as in 145,020. The
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!