1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Advocard [28]
3 years ago
5

- Which amongst the following is not a Characteristic of Cloud Computing?

Computers and Technology
1 answer:
vladimir1956 [14]3 years ago
7 0

Answer:

(1) Rigidity

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Infrastructure as a Service (IaaS).

3. Software as a Service (SaaS).

The two (2) main characteristics of cloud computing are;

I. Measured service: it allows cloud service providers to monitor and measure the level of service used by various clients with respect to subscriptions.

II. Resource pooling: this allows cloud service providers to serve multiple customers or clients with services that are scalable and provisional.

However, rigidity is not a characteristic of cloud computing because it is generally considered to be dynamic and flexible for the end users.

You might be interested in
Kim agrees. You get the equipment from the truck and begin working. Kim approaches you as you are installing the modem and is a
Angelina_Jolie [31]
Ask your friends if they are doing something wrong with your friends and friends
6 0
1 year ago
Which of the following is a use for a honeynet? A. Detecting network attacks and scans B. Slowing down attackers C. Concealing n
inn [45]

Answer:

A. Detecting network attacks and scans

Explanation:

Honeynet

It is a network , which is set up with the intentional vulnerabilities , in order to invite the attack , in order to determine and study the activities of the attacker .

The Honeynet is composed of one or more honey pots , which are just the computer systems , which act as a bait to trap the people who , tries to hack or penetrate into other's computer system .

Hence ,

The correct option is Detecting network attacks and scans .

5 0
3 years ago
Select the correct answer.
Nady [450]

Answer:

B

Explanation:

In an ERD, the Crow Foot Notation Symbols are used with cardinality.

Hope it helps you

3 0
2 years ago
Which are types of lines? Choose three answers.
alekssr [168]
Straight
Curvilinear
Rectilinear
7 0
3 years ago
In one to two sentences, describe how you would create a border around a group of cells.
Maslowich

Answer:

Select the cells you want to format. Click the down arrow beside the Borders button in the Font group on the Home tab. A drop-down menu appears, with all the border options you can apply to the cell selection.

6 0
2 years ago
Other questions:
  • Which of the following menu commands would you select to make a copy of an open file and rename it?
    15·1 answer
  • Which of the following is a narrative essay most like?
    10·2 answers
  • For connection to place on any network you must have a set of standards?<br> O True<br> O False
    8·1 answer
  • Some numbers are formed with closed paths. the digits 0, 4, 6 and 9 each have 1 closed path and 8 has 2. None of the other numbe
    6·1 answer
  • In a c program, if you see a variable in main declared: float farray[20]; describe what farray is
    10·1 answer
  • You have stumbled on an unknown civilization while sailing around the world. The people, who call themselves Zebronians, do math
    11·1 answer
  • I plugged my headphones into my computer, but the sound still came out of the speakers. help!
    6·2 answers
  • HELP ME ASAP
    10·1 answer
  • Help pls put them in order for me??
    9·2 answers
  • If the three operations were combined, O(logN) + O(N) * O(logN) + 1, the overall algorithm cost would be:________
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!