1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zavuch27 [327]
4 years ago
8

Select the correct answer from each drop-down menu.

Computers and Technology
2 answers:
gtnhenbr [62]4 years ago
5 0

Answer:

Cloud computing allows users to sell computing resources and follows the pay once use multiple times payment model.

Explanation:

If you sell u pay once and always use.

Hoochie [10]4 years ago
5 0

Answer:

Cloud computing allows users to Rent computing resources and follows the pay as you go

Explanation:

cloud computing is a computer technology that uses the internet and a series of centrally located servers to store data and applications from its users. the users of a cloud computing technology can have access to their stored files/data without having to actually install the cloud computing application but they can achieve this through any computer that has an internet connection hence they will pay as they use and have multiple access to their files on any system .

In Cloud computing users do not necessarily buy the computing resources or install them to use the cloud computing.

You might be interested in
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f
vodomira [7]

Answer:

Phishing.

Explanation:

Networks and computer systems in a network are susceptible to cyber attacks. A cyber attack is a networking term that describes a situation where a network is penetrated by a malicious process or program induced by an attacker or attackers.

A cyber attacker's sole intention is to steal information needed to achieve a malicious and devastating action to a client's personal assets. An example of such attacks is phishing.

Phishing is an attack that collects client's personal information at an imposter website after receiving an email from a person masquerading as an employee from a bank.

5 0
4 years ago
Help me hsvdbcocnbsnajx cb
Artyom0805 [142]
1) clipboard
2) Secondary storage
3) word wrap
4) character
5) desktop
6) Personal Computer
5 0
3 years ago
Dairy Farm decided to ship milk in containers in the form of cubes rather than cylinders. Write a program called ws4.cpp that pr
Sonja [21]

Answer:

1. #include <iostream>

2. #include <cmath>

3.  

4. using namespace std;

5.  

6. int main()

7. {

8.     float radius;  

9.     cout << "Type the radius of the base: "; // Type a number

10.     cin >> radius ; // Get user input from the keyboard

11.      

12.     float height;  

13.     cout << "Type the height: "; // Type a number and press enter

14.     cin >> height; // Get user input from the keyboard

15.      

16.     float volumeCylinder = 3.1416 * radius * radius * height;

17.     float cubeSide = std::pow(volumeCylinder, 1/3.);

18.     cout<<"Cube side is: "<< cubeSide;

19.      

20.     return cubeSide;

21. }

Explanation:

  • From line 1 to 5 we include two libraries
  • From line 6 to 7 we declare our main function
  • From line 8 to 11 we ask the user for the radius of the cylinder
  • From line 12 to 15 we ask the user for the height of the cylinder
  • On line 16 we calculate the volume of the cylinder using the formula        V=pi*(r^2)*h
  • On line 17 we calculate the side of the cube with the same volume as the cylindrical container using the formula side=∛(V)
  • From line 18 to 21 we print and return the value of the cube's side  
Download cpp
3 0
3 years ago
Which of the following describes the line spacing feature? Select all that apply. adds space between words adds space between li
dangina [55]

Answer:

adds space between lines of text

adds space between paragraphs

Explanation:

4 0
3 years ago
If you cannot find the CD with the device driver when installing a new piece of hardware what option should you try
Svetach [21]

Answer:

i think it is a not sure though

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • PLS HELP!!
    13·1 answer
  • What is unique about being an administrative professional in a government job?
    8·2 answers
  • Consider the formula: G=D+(A+C^2)*E/(D+B)^3 Show the order that a processor would follow to calculate G. To do so, break down th
    10·1 answer
  • The natural functions of Earth seem all _____ in one way or another.
    9·1 answer
  • A user complains that Skype drops her videoconference calls and she must reconnect. At which layer of the OSI model should you b
    9·1 answer
  • Create detailed pseudocode for a program that calculates how many days are left until Christmas, when given as an input how many
    15·1 answer
  • What is this tool called?<br> *
    9·2 answers
  • Describe the forward button​
    7·1 answer
  • Why is it important to be a good digital citizen? 2-3 sentences
    10·2 answers
  • Which of the following programming languag
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!