1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mila [183]
3 years ago
12

A small company has hired you to take over its IT needs. The company currently has seven on-site employees and 12 remote employe

es working from their homes and is looking to hire an additional 20 employees in the next six to eight months. the owners of the company are asking you to obtain a business service that will meet the needs of the current staff as well as scale up when the company grows. The services must provide adequate and scalable computing power and storage. which cloud service model should you implement ?
a) SaaS
b)IaaS
c)XaaS
d) PaaS
Computers and Technology
1 answer:
Alex787 [66]3 years ago
7 0
The answer should be c if not it’s b
You might be interested in
Write a function getPigLatin(pigStr) that accepts pigStr as a parameter (a sentence as input) and converts each word to "Pig Lat
Vladimir79 [104]

Answer:

userInput = str(input("Enter your sentence here.\n")).upper()

def getPigLatin(userInput):

   splitInput = userInput.split(" ")

   newList = []

   for word in splitInput:

       firstLetter = word[0]

       if len(word) == 1:

           word += 'AY'

           newList.append(word)

       else:

           word = word.strip(word[0])

           word += firstLetter

           word += 'AY'

           newList.append(word)

   print(*newList, sep= " ")

getPigLatin(userInput)

Explanation:

This solution is done in Python

First the user is prompt to enter a statement, the statement converted to string and also capitalize using str and upper() built-in function. The user input is assigned to userInput variable.

The getPigLatin function is defined and it accept a string as parameter. Inside the getPigLatin function, the userInput is splitted and assigned to splitInput variable.

An empty list is also initialized and assigned to newList. Next, we loop through the splitInput. During the loop; we first check if the length of an element is one, then we just add 'AY' to the element and add the element to the newList. Else, if the element length is more than one; we strip the first letter from the word and also re-assign it to word, then the stripped first letter is added to the end of the word. Next, 'AY' is added to the word and the element is add to the newList.

The last line of the getPigLatin function display the entire element of the list using a space seperator.

The last line of the entire solution call the function passing in the userInput as argument.

8 0
4 years ago
What are some causes of the number of bytes on the wire exceeding the number of bytes being captured?
Aneli [31]
<span>Some causes of the number of bytes on the wire exceeding the number of bytes being captured is that </span>not everything is being captured or that partial packets may be captured which could lead to incorrect analysis. If there are regularly more bytes on the wire than captured, then, it is possible that the computer on which Wireshark is running is not able to keep up with the interface.
7 0
3 years ago
Read 2 more answers
Select the correct answer. Vlad wants to include his goals and target in his résumé. He also wants to add how he can be benefici
Alla [95]

Answer:

Goals and targets in A

how he can be beneficial to the company in cover letter

Explanation:

While writing a resume goals and targets are added to objectives section.Which briefly describes your goals and gives a hint on your overall motives to join an organizations.While to add other information like how can you be beneficial for company a cover letter is attached with resume which contains information like why you are best fit for the job and  how can you be beneficial for this job.

Cover letter makes great first impressions and sometimes basic screening is done on the basis of cover letters.

6 0
4 years ago
Agent Phil Coulson developed this program to register Avengers in S.H.I.E.L.D's database using cutting-edge programming language
rosijanka [135]

eh I think yes I think. Maybe

6 0
3 years ago
A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the
joja [24]

Indicators of compromise enable system administrators and information security professionals to detect intrusion attempts or malicious activities.

Your information is incomplete as the options aren't provided. Therefore, an overview of indicators of compromise will be given.

Indicators of compromise means the pieces of forensic data that are found in files or system log entries to identify malicious activity on a network or system.

Indicators of compromise help IT and information security professionals to detect malware infections, data breaches, etc. Examples of indicators of <em>compromise</em> include log-in red flags, unusual outbound network traffic.

Read related link on:

brainly.com/question/25522987

8 0
3 years ago
Other questions:
  • A(n) ____ loop executes a predetermined number of times.
    12·1 answer
  • Which of the following is needed if a computer with the IP address 172.31.210.10/24 wants to communicate with a computer with th
    5·1 answer
  • Which of the following is a popular open source intrusion detection system that runs on SmoothWall?? Synchronous Dynamic Random
    6·1 answer
  • You can't get close enough to the facility interior to launch an evil twin attack against its wireless clients; in fact, you hav
    11·1 answer
  • Instructions:Select the correct answer from each drop-down menu. What type of font color should Kim select if she chooses a dark
    10·2 answers
  • Help please
    13·2 answers
  • What will be the results from running the following code?
    5·1 answer
  • Who are the following furries?
    10·2 answers
  • PLEASE HELP! WILL MARK AS BRAINLIEST!
    6·2 answers
  • identify the difficulties with the k-nearest neighbor algorithm. a. both a and b b. calculate the distance of the test case from
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!