1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
TEA [102]
3 years ago
6

One of the major disadvantages of application service providers (ASPs) is that they:

Computers and Technology
1 answer:
AVprozaik [17]3 years ago
8 0

Answer:

do not guarantee that applications will fully meet an organization's needs.

Explanation:

An application service provider is a third-party group established to deliver commercial software applications and additional services related to such software and do so online and sometimes their services do not guarantee that their applications will fully meet an organization’s needs.

You might be interested in
If the code for CAT is ECV what is the code for DOG? *
masha68 [24]
This seems to be a ROT2 Ceasar cipher. Replace each letter with a letter two places futher in the alphabet. Do the same with DOG and get <span>FQI.</span>
3 0
3 years ago
Read 2 more answers
Explain what the problems with the implementation of the function are, and show a way to fix them.// return true if two C string
Nataly [62]

Answer:

The code is not dereferencing the pointers. You have to place an asterisk in front of the pointer to read the value the pointer points to.

Explanation:

So "if (str1 != str2)" must be "if (*str1 != *str2)".

likewise:

   while (*str1 != 0 && *str2 != 0)

and

     result = (*str1 == *str2);

7 0
3 years ago
Compare and contrast traditional and cloud data backup methods. Assignment Requirements You are an experienced employee of the D
jasenka [17]

Answer:

Ensures all database elements are known and secured through inventory and security protocols. Catalogs databases, backups, users, and accesses as well as checks permissioning, data sovereignty, encryption, and security rules. 

Security Risk Scoring

Proprietary Risk Assessment relays the security posture of an organization's databases at-a-glance through risk scores.

 Operational Security

Discovers and mitigates internal and external threats in real time through Database Activity Monitoring plus alerting and reporting. Identifies and tracks behavior while looking for anomalous activity internally and externally.

Database Activity Monitoring

Monitors 1 to 1,000+ databases simultaneously, synthesizing internal and external activity into a unified console.

Only by covering both of these areas can organizations have defense in depth and effectively control risk.

8 0
3 years ago
In the context of data quality management tools, _____ software is one that gathers statistics, analyzes existing data sources a
Dimas [21]

Answer:

Data-profiling software

Explanation:

Data-profiling software -

It refers to the software , that helps to collect the data or information from a particular existing source and performed it analysis , is referred to as a Data-profiling software .

The software helps to determine information about a topic , or analyse the pattern , for the process of comparison etc.

Hence , from the given information of the question ,

The correct answer is Data-profiling software .

5 0
3 years ago
Every character, number, or symbol on the keyboard is represented as a _____ in computer memory.
Lorico [155]
Every character, number, or symbol on the keyboard is represented as a binary number in computer memory.
3 0
3 years ago
Read 2 more answers
Other questions:
  • When saving a document or drawing, you determine the destination folder in which the file will be saved by?
    6·1 answer
  • What do you think of explaining to young people, from high school, the legitimacy of copyright and the dangers they can run on t
    11·1 answer
  • Anderson uses his computer and internet link to chart the movement of his favorite 46 stocks. He buys and sells according to the
    15·1 answer
  • You need to test a condition and then execute one set of statements if the condition is true. If the condition is false, you nee
    9·1 answer
  • Individuals with desirable traits will be __________ to have young that survive than individuals without these traits. (2 points
    5·2 answers
  • 1.6.M - Assignment: Understanding If Else Statements in Python
    7·1 answer
  • Intrusion Detection System (IDS) is a security mechanism that detects unauthorized user activities, attacks, and network comprom
    5·1 answer
  • MULTI-SELECT
    9·2 answers
  • if I make an Xfinity account can I turn off parental controls that my sister put on with her Xfinity account?
    10·1 answer
  • you need a storage device that has very large storage capacity, is fast, and is relatively inexpensive. which storage device wil
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!