1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
trasher [3.6K]
3 years ago
10

In a _____ cloud, a participating organization purchases and maintains the software and infrastructure itself.

Computers and Technology
1 answer:
notka56 [123]3 years ago
6 0

Answer:

"Private" is the right solution.

Explanation:

  • Application servers supplied sometimes over the World wide web or through a personal corporate network as well as to chosen customers rather than the community benefit of the entire, is termed as the private cloud.
  • It provides companies with the advantages of a cloud environment that include self-checkout, adaptability as well as flexibility.
You might be interested in
_____ is a method of access control that prevents unauthorized users from using an unattended computer to access the network and
Hoochie [10]

Answer:

Terminal Resource Security

Explanation:

Terminal Resource Security is a type of access control that prevents unwanted user from using a computer that is not in use to access the data and network. It is feature in a software that ensures that the screen of a computer is erased and a user is automatically signed off after a particular length of inactivity. It is used by many organizations.

5 0
3 years ago
Earth's current era is the _______ era.
natita [175]
We are in the Cenozoic Era
6 0
4 years ago
Read 2 more answers
Define generation of computer ​
steposvetlana [31]

Answer:

The generation of computer is define as the devlopment in computer hardware/software,their processing speed and their language.

I HOPE IT HELP YOU

5 0
2 years ago
One lap around a standard high-school running track is exactly 0.25 miles. Write a program that takes a number of miles as input
salantis [7]

Answer:

import java.util.Scanner;

public class Miles {

public static void main(String[] args) {

   //initialization

       double Number_Miles;

       //print the message

       System.out.print("Enter the number of miles: ");

       Scanner scn1 = new Scanner(System.in);

       

       Number_Miles = scn1.nextDouble();  //read the input from user

       //calculate the laps

       double yourValue = Number_Miles/0.25;

       //display the output on the screen

       System.out.printf("%.2f", yourValue);

     

}

}  

Explanation:

First import the library Scanner than create the class and define the main function. In the main function, declare the variables.

print the message on the screen and then store the value enter by the user into the variable.

Scanner is a class that is used for reading the output. So, we make the object of the class Scanner and then object call the function nextDouble() which reads the input and store in the variable.

After that, calculate the number of laps by dividing the number of miles with the given one lap running track value (0.25 miles).

Number\,of\,laps = \frac{Number\,of\,miles}{0.25}

the output is stored in the variable.

After that, print the value on the screen with 2 digits after the decimal point.

we can use "%.2f" in the printing function in java.

like System.out.printf("%.2f", output);

5 0
3 years ago
Read 2 more answers
Both computers and people handle information using which processes?
GenaCL600 [577]

Answer:

Explanation:

Both computer and human use the process of encoding, storage and retrieval to process information.

Encoding is the process of putting the information in a format that will be understood by either the human or the computer. The information is then stored in the memory. Both the computer and human have memory where the information will be store. When the information is needed, it is then retrieved from the location in which it was stored.

6 0
3 years ago
Other questions:
  • Input _____ is a template or pattern that restricts data entry and prevents errors.
    7·1 answer
  • Attacker player X is standing still on a corner kick, as the ball is played, he jumps up with his arms flailing above his should
    8·1 answer
  • It is important to keep a copy of your written plan and safety records off-site. A) True B) False
    6·2 answers
  • Which type of computer do dedicated gamers and video editors prefer?​
    11·1 answer
  • Please help I’ll give you 10 points
    8·2 answers
  • Which of the following is true about images that are arranged in a collumn
    9·1 answer
  • A technician suspects a network card is not working. Which tool should the technician use to test the network card?
    8·1 answer
  • I need solutions to below questions with python code:
    8·1 answer
  • Given three packets of size 2,500 Bytes (caution this is Bytes not bits) each are ready inside computer 1 to be transmitted onto
    14·1 answer
  • Write a program that generates 100 random numbers and keeps a count of how many of those random numbers are even and how many of
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!