1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zavuch27 [327]
4 years ago
8

Select the correct answer from each drop-down menu.

Computers and Technology
2 answers:
gtnhenbr [62]4 years ago
5 0

Answer:

Cloud computing allows users to sell computing resources and follows the pay once use multiple times payment model.

Explanation:

If you sell u pay once and always use.

Hoochie [10]4 years ago
5 0

Answer:

Cloud computing allows users to Rent computing resources and follows the pay as you go

Explanation:

cloud computing is a computer technology that uses the internet and a series of centrally located servers to store data and applications from its users. the users of a cloud computing technology can have access to their stored files/data without having to actually install the cloud computing application but they can achieve this through any computer that has an internet connection hence they will pay as they use and have multiple access to their files on any system .

In Cloud computing users do not necessarily buy the computing resources or install them to use the cloud computing.

You might be interested in
Mrs. Dunn shows her students a data range, which has been named "Goals," covering cells A14 to A25. She tells her students that
Butoxors [25]

Answer:

Hina and Riko; the dialog box is inside the Name Manager group, and it allows the user to manually type in the additional cells or select the cells after clicking the collapse button.

3 0
4 years ago
What role/service is windows 2012 server backup part of?
seraphim [82]
The answer is (D) windows server essentials experience


When Windows server Essentials Experience Role available in Windows Server 2012 R2 Standard and Datacenter is installed, you can take advantage of the many features available in Windows Server 2012 R2 Essentials. This service enables you to protect your client and server by backing up all the client computers and your server within the network.


6 0
3 years ago
In your own words, explain at least one reason why programming languages have functions.
Nataly [62]
Programming languages have functions because, they are the set of operations that may be applied to objects of that particular class.
for an example I will attach a function, you just check it

brainliest pls

5 0
4 years ago
A software or hardware that checks information coming from the Internet and depending on the applied configuration settings eith
photoshop1234 [79]

Answer:

1. Firewall.

2. Router.

3. Proxy.

4. SMTP, 25.

Explanation:

1. A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

Furthermore, firewalls are typically bidirectional, it checks all sent and received data and only allow authorized traffic through.

2. A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

A routing protocol refers to a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

Additionally, in order for packets to be sent to a remote destination, these three parameters must be configured on a host.

I. Default gateway.

II. IP address.

III. Subnet mask.

3. A proxy can be defined as a computer network service designed to avail end users (clients) the ability to connect indirectly to other network services. For example, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and it forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and performance of a network.

4. A spam filter can be defined as a software program designed to process all incoming electronic messages (e-mails) and prevents any unsolicited or unwanted mail (spam) from entering the inbox of a client.

Generally, a spam filter uses SMTP with port number 25 to carry out its services.

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

3 0
3 years ago
When data is being prepared for transmission onto the network, it is broken into small pieces and a header and trailer are added
Archy [21]

Answer:

The correct answer to the following question will be "Encapsulation".

Explanation:

  • Encapsulation relates to the pooling of data with techniques used by the database or the limitation of immediate access to many of the elements of the entity.
  • As data is being processed for transfer to the network, it's split into tiny pieces and a trailer and header are attached to each piece to help determine it.
  • It is a method of shielding data facts and preserving the object's data and actions from abuse by certain objects.

Therefore, Encapsulation is the right answer.

8 0
3 years ago
Other questions:
  • The term ________ refers to fluid flow back to the pan to empty or drain a circuit.
    5·1 answer
  • Which of the following describes the term "false information?"
    5·1 answer
  • Write the function header (the first line of the function definition) to define a function named DisplayStats that accepts a str
    5·1 answer
  • Help me out with this .....
    10·1 answer
  • What is the output of the following program?
    11·1 answer
  • It is an island country; it fought against us in World War II; it is known for sushi.
    14·2 answers
  • Hi I need help with an assignment. We're learning about encryption and decryption in code.org. i need help with three of the tex
    14·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    5·1 answer
  • ____________________________ and _________________________ are 2 positive impacts of the internet on businesses.
    14·2 answers
  • A slide titled Alexander Graham Bell. There are 6 bulleted entries on the slide, and there is a lot of text on the slide. There
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!