1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flura [38]
3 years ago
13

________ is a model of computing in which firms and individuals obtain computing power and software applications over the intern

et, rather than purchasing and installing it on their own computers.
a. client/server computing
b. p2p computing
c. mobile computing
d. cloud computing
Computers and Technology
1 answer:
Irina-Kira [14]3 years ago
4 0
Pretty sure the answer is A.
You might be interested in
Int a=10 int b=20<br> A=b<br> The new values for a and b are
loris [4]
After a = b new values would be: a = 20, b = 20
3 0
3 years ago
Read 2 more answers
You can use the Ignore All button to ignore the current and all future occurrences of a flagged word. True or False
Pepsi [2]

Answer: True

Explanation: "Ignore All" button is the button that operates when the user wants to ignore the word that is flagged .Flagged words are those which chosen by user to be banned and don't want to use in future.

Ignore all button helps in the ignoring of the spelling check of the words that the user is sure about and the words that user don't want to be the part of their content.This banning is for the future use and current time as well.Thus, the statement is true.

4 0
3 years ago
Write the algorithm for finding the perimeter of a rectangle using English like form step by step
olya-2409 [2.1K]
L+L+W+W= Permiter
Or Lenght+Lenght+Width+Width= Perimeter
That’s all just add all the 4 sides
8 0
3 years ago
Sharon's company has written a new computer program, and she has been asked to find a way to prevent people from copying the sof
Tasya [4]

Answer:

Sharon's company has written a new computer program, and she has been asked to find a way to prevent people from copying the software they purchase and giving it to others who have not purchased the software. What can Sharon's company do to make sure a customer who p…

A:

Use DRM.

Explanation:

Use DRM.

8 0
2 years ago
How does the DNS solve the problem of translating domain names like example.com into IP addresses?
TEA [102]

Answer:

DNS translates domain names and hostnames into IP addresses through a basic lookup function.  When a user requests a domain name (as in the case of a browser lookup) the computer queries the local DNS server to find the matching IP address.  If the local DNS server does not contain the information in it's local database, it contacts the next higher DNS system or the root domain DNS servers (i.e. microsoft.com - if the local system does not know it, it will query the well-known DNS server for the .com domain - which will know where to get the information).  

DNS helps the users by not requiring them to remember the IP address of every system them want to connect with.  microsoft.com is much easier to remember than 40.82.167.220.  

DNS also helps the internet scale through the use of load balancing.  Multiple systems can comprise a single web site with the web pages stored on many different machines with multiple IP addresses.  When a user requests the microsoft.com website IP, they are given the primary IP of the load balancer sitting in front of the multiple computers.  The load balancer will then distribute the traffic to any of the systems that are hosting the web page that are not busy.  To the end user it look like they are connecting to a single machine - when in fact they are connecting to one of potentially hundreds of web servers with the same content.  As traffic grows on the internet more servers are necessary to handle the additional traffic.  DNS helps ensure the end user will connect to the proper web server regardless of the number of web server copies spun up in response to the additional traffic.  This allows the capacity to scale as necessary without interruption to the web site.  

Explanation:

6 0
3 years ago
Other questions:
  • Jesse has finished typing an essay for her college assignment and submitted it. The next day she received an email from her prof
    15·2 answers
  • tion. 6. A step occasionally required to repair damaged relationships is O A. looking at the problem from the other person's poi
    14·1 answer
  • A restaurant has a case type that allows customer to book the dining room for events. Customers provide basic information includ
    7·1 answer
  • Suppose we are given an arbitrary digraph G = (V, E) that may or may not be a DAG. Modify the topological ordering algorithm so
    8·1 answer
  • What is this system's reliability at 700 hours? Component failure data is: Failure Rate of A = 0.0007 failures/hour Reliability
    9·1 answer
  • Write two methods: encrypt and decrypt. encrypt should #take as input a string, and return an encrypted version #of it according
    6·1 answer
  • What is the value of the variable named result after the following code executes? var X = 5; var Y = 3; var Z = 2; var result =
    14·1 answer
  • What are some professionals that complete network administrator
    11·1 answer
  • A python program for the following output using for loop.
    13·1 answer
  • Need help with Python coding...
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!