1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naya [18.7K]
2 years ago
13

Doctors at a regional hospital access an online database of patient records that is being developed and tested by a conglomerate

of health insurance agencies. The database contains records of hundreds of thousands of patients and is regulated by HIPAA restrictions on protected health information (PHI). What kind of cloud deployment is this database?
Computers and Technology
1 answer:
shepuryov [24]2 years ago
4 0

Answer:

This seems to be DBaaS, in other words, Database, implementation mostly as a service cloud. A further explanation is given below.

Explanation:

  • DBaaS seems to be a framework for cloud storage that enable participants to choose a standard collection of abstractions to provide, maintain, consume, customize, as well as run databases.
  • Everything just allows consumers with either a treatment process that leads to a database but without specific system configuration, software installation, or performance configuration. Doctors didn't require any database built on certain machines in this situation, because of being able to view every data electronically.
  • Doctors would not have to do database management here since the phone company will require control of it. Accessing the documents what they'd have to do. Any further rights can be obtained through proper permits, such as data upgrading respectively.
You might be interested in
This function chooses the screen to display based on the score.What is the correct way to call this function?
mario62 [17]

Answer:

checkWin();

Explanation:

its in the code

7 0
3 years ago
Read 2 more answers
A document repository is down when you attempt to access it. which isa principle is being violated?
Tju [1.3M]
When a document repository is down when you attempt to access it, the ISA principle Authentication is being violated. The authentication method is done during the log on phase and is performed by the ISA server which requests certificate. <span>The client then needs to send the appropriate client certificate to the server in order to be authenticated and to have access to the document.</span>
3 0
2 years ago
How does coding work on computers?
sleet_krkn [62]
Coding works through programming/programs. Programs have different coding languages, and text files. The code within the file is known as the "source CODE" this code is used in different ways, causing for the possibility of separate binary files that computers can directly run. Hope I helped.

5 0
3 years ago
Write a little man program that accepts three values as input and produces the largest of the three as output.
ki77a [65]
Required: program to return the largest of three numbers.

pseudocode

input parameters, int A,B,C;
int T; // temporary storage
if (A>B) T=A;
else T=B;
if (T>C) print(T);
else print(C);


5 0
2 years ago
Enumerate the the risk in the preparation and cooking in starch and cereal dishes and other food​
Novay_Z [31]
———————————————————.
6 0
2 years ago
Other questions:
  • I have a bag of trail mix.half of the bag contains peanuts.1/4of the bag is chocolates candies, and 1/4of the bag is dried fruit
    12·2 answers
  • Which protocol do many browsers assume when you enter a URL in the address field?
    9·1 answer
  • I am sorting data that is stored over a network connection. Based on the properties of that connection, it is extremely expensiv
    14·1 answer
  • Point out the correct statement.
    11·1 answer
  • You are given an integer N, followed by N lines of input (1 &lt;= N &lt;= 100). Each line of input contains one or several words
    8·1 answer
  • What is printed to the console?<br> console.log(15 % 4);<br><br> 1<br><br> 2<br><br> 3<br><br> 4
    9·1 answer
  • What are two different ways by which a laptop could utilize the cellular network connection of a mobile device
    15·1 answer
  • Which of the following statements is TRUE of a peer-to-peer network?
    10·1 answer
  • Does technology shape society or does society shape technology?
    14·1 answer
  • True or false: Quality score is an algorithm that scores each of your search ads on spelling and grammar.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!