1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Levart [38]
3 years ago
8

Suppose a company A decides to set up a cloud to deliver Software as a Service to its clients through a remote location. Answer

the following [3] a) What are the security risks for which a customer needs to be careful about? b) What kind of infrastructural set up will be required to set up a cloud? c) What sort of billing model will such customers have?
Computers and Technology
1 answer:
finlep [7]3 years ago
8 0

Answer:

perdonnosee

Explanation:

You might be interested in
A network is a group of two or more computers or devices connected together. To be able to connect, they each need a
Kay [80]
D. Internet service protocol (isp)
6 0
3 years ago
Read 2 more answers
Byte pair encoding is a data encoding technique. The encoding algorithm looks for pairs of characters that appear in the string
erica [24]

Answer:

C. Byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.

Explanation:

Byte pair encoding is a form of encoding in which the most common pairs of consecutive bytes of data are replaced by a single byte which does not occur within the set of data.

For example, if we has a string ZZaaAb, it can be encoded if the pairs of string ZZ are replaced by X and the second pair by Y. So, our data now becomes XYAb.

To get our original data, that is decode it, we just replace the data with the keys X = ZZ and Y = aa thus allowing our original data to be restored.

Since our original string is restored without loss of data, it implies that <u>byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.</u>

8 0
3 years ago
In 2009 to 2010, how many social network users were reported as being victims of online abuse?
Dafna1 [17]
The answer is B because being victims of online abuse is not important
7 0
3 years ago
Read 2 more answers
The concept that allows certain professions to use copyrighted material without permission in their work is called _____.
lesantik [10]
C) fair use

Hope this helps... mark as Brainliest plz
4 0
4 years ago
The number of pixels displayed on the screen is known as ​
puteri [66]

Answer: Resolution

Explanation: The total number of pixels that can be displayed on the screen at a time is called the resolution of the screen. This resolution is normally described in the pair of numbers, such as 2560 x 1440. This means, the computer screen is 2560 pixels wide and 1440 pixels tall.

4 0
3 years ago
Other questions:
  • How to upload themes to chrome web store
    11·1 answer
  • Pascal's Triangle is a triangular array in which every number represents the
    15·1 answer
  • What do character formats do for your document's message??
    14·2 answers
  • Discuss the differences between a quantitative and qualitative risk analysis. Please write two paragraphs.
    8·1 answer
  • A short cut to save a file is
    15·1 answer
  • A process at Host C receiving two incoming UDP segments from two different hosts will know that they originated from two differe
    14·2 answers
  • - Which amongst the following is not a Characteristic of Cloud Computing?
    5·1 answer
  • How many pieces can be connected on to a to an SPS​
    11·1 answer
  • Will give brainly if answer all or my questions
    8·1 answer
  • Use the {blank} to view your presentation the way an audience will see it.
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!