1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
emmasim [6.3K]
3 years ago
14

What is a collection of computing resources that are elastic and highly virtualized?

Computers and Technology
1 answer:
In-s [12.5K]3 years ago
5 0

Answer:

private cloud

Explanation:

I just know

You might be interested in
Who invented napier bone and when​
Alinara [238K]

Answer:

<u>Inventor :</u>   John Napier in Year 1617

Explanation:

He was also the inventor of logarithms (which was  invented to aid calculation known as 'Napier's Bones' in 1617.

7 0
3 years ago
Read 2 more answers
An attacker obtains a connection to your LAN and then uses SETH to perform a MiTM attack between your system and the company RDP
maxonik [38]

The type of attack which has occurred in this scenario is known as credential harvesting.

<h3>What is credential harvesting?</h3>

Credential harvesting is also known as account harvesting and it can be defined as a type of attack that involves the use of the following techniques to illegally obtain large numbers of user credentials (username or password):

  • MITM attacks
  • DNS poisoning
  • Phishing

In conclusion, the type of attack which was used in this scenario is known as credential harvesting.

Read more on phishing here: brainly.com/question/23850673

#SPJ1

3 0
2 years ago
Consider the following definitions:public boolean someMethod (int[] list, int value){ int counter; boolean flag = false; for (co
alexandr1967 [171]

Answer:

C. Under the condition that value != list[list.length − 1]

Explanation:

In the loop, the value of flag gets overwritten in each iteration, so only the last value of the list matters. Flag is true when value is not equal to the last list element, which is at position list.length-1.

4 0
3 years ago
What is the difference between a try block and a try statement? Group of answer choices There is no difference; the terms can be
telo118 [61]

Answer:

Coding is a skill where you take instructions (the steps in a task) and translate it into a language the computer understands since computers do not language.

Explanation:

Coding is a skill where you take instructions (the steps in a task) and translate it into a language the computer understands since computers do not communicate like humans. They communicate in a language called BINARY and it is uses 0's and 1's. Coders write the instructions using a programming language.

8 0
3 years ago
Nolan has just created a linked cell to another cell in a separate worksheet in his current Excel 2016 workbook.
kipiarov [429]

Answer: dependent

Explanation:

A Cells containing formulas which refer to other cells are known as dependents.

These are cells that depend on values in the selected cell.

A dependents cell can either contain a formula or a constant value.

(Ctrl + ] ) Is used as a shortcut when selecting dependents cells in an active cell.

Another option is to make use of you (Tools > Formula Auditing > Trace Precedents).

4 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following Office Online apps is most effective for creating spreadsheets?
    14·2 answers
  • Pressing the Backspace key deletes the text to the of the insertion point. The left or the right?
    8·2 answers
  • Can anyone fill in the space please
    6·1 answer
  • Language/Type: Java ArrayList Collections
    6·1 answer
  • Hi Alaza, when you submit this form, the owner will be able to see
    12·1 answer
  • Who wanna be besties
    8·2 answers
  • It is where the home tab is located where you can view all the all the formatting purpose <br>​
    11·1 answer
  • Which of the following is the responsibility of a computer support specialist? (A) conducting a usability study (B) providing sa
    6·2 answers
  • And this also please. help​
    15·1 answer
  • Why is computer called and information processing machine​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!