1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oliga [24]
3 years ago
7

GuardIN is an IT security firm. It deals with highly secure data for a wide variety of software and e-commerce agreements, trade

mark licenses, and patent licenses. GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself. The cloud also needs to be designed in such a way that all users of the organization can access it without any lag. Which cloud computing option would be most suitable for GuardIN?
Computers and Technology
1 answer:
jeka57 [31]3 years ago
3 0

Answer:

GuardIN is an IT security firm. It deals with highly secure data for a wide variety of software and e-commerce agreements, trademark licenses, and patent licenses. GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself. The cloud also needs to be designed in such a way that all users of the organization can access it without any lag. Which cloud computing option would be most suitable for GuardIN?

Explanation:

You might be interested in
As of 2012, Twitter has approximately how many members?
Artyom0805 [142]

Answer:

B

Explanation:

FROM STATISTICS ON TWITTER IT WAS 465MILLION USERS

4 0
3 years ago
After a Hacker has selects her target, performed reconnaissance on the potential target's network, and probed active Internet Ad
Gnoma [55]

After a Hacker has selects her target,  the thing she scan next on the target's network to see if any are open System Ports.

<h3>How do hackers scan ports?</h3>

In port scan, hackers often send a message to all the port, once at a time. The response they tend to receive from each port will help them to known if it's being used and reveals the various weaknesses.

Security techs often conduct port scanning for a lot of network inventory and to show any possible security vulnerabilities.

Learn more about Hacker from

brainly.com/question/23294592

7 0
3 years ago
Ashley works for a company that helps hospitals hire new doctors. They have written a list of strategies that can be used to int
enyata [817]

Answer:

A file.

Explanation:

A file can be defined as a computer resource used for the collection of data (informations) as a single unit.

Basically, files are of different types or in various formats (forms) and these includes document, video, audio, image, software application, data library etc.

Additionally, various operations such as open, close, edit, format, delete, save, rename, compress etc. can be performed on a file through the use of specific software applications or programs.

In this scenario, Ashley wants to give a list of strategies that can be used to interview doctors to their supervisor to review.

Hence, what Ashley should give to the supervisor to do a review is a file.

6 0
3 years ago
Why is it unlikely that you will find the ip address 192.168.250.10 on the internet?
gayaneshka [121]
That IP address is either Internal, private or reserved
5 0
4 years ago
Sherri is considering replacing a processor on her laptop. The laptop is running slower than she would like. What should Sherri
Schach [20]

Answer:

Option b, Option c, and Option d  are the correct options.

Explanation:

While Sherri is replacing the laptops processor because her's laptop working slow as compared to the past performance then, she decided to ensure to use the right processors for her laptop's motherboard. Then, she verifies that not under the warranty, and she also determines that the teardown procedure is available or not.

4 0
4 years ago
Other questions:
  • Why does the hp computer not have Bluetooth?
    6·1 answer
  • When there is flooding and you see pooled water, what should you do?
    13·1 answer
  • A group of computers that are interconnected in order to share information or documents is called a _____
    9·1 answer
  • Help me please and thanks
    8·1 answer
  • Universal containers regularly imports Accounts from an external order system that has its own ID field for each record.What sho
    8·1 answer
  • Write motivation of cache memory​
    9·1 answer
  • Consider the code block below. What is the value of amount when this method is called twice, the first time using cookieJar(7) a
    9·1 answer
  • The cost of a postsecondary education increases with the length of time involved in the program.
    10·1 answer
  • Hurry please I’ll give Brainliest if you are right
    5·1 answer
  • If you want to create a line of code that will not appear in the interpreter, what symbol should begin the line?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!