1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
photoshop1234 [79]
3 years ago
10

Need deveolpers not software

Computers and Technology
2 answers:
Olegator [25]3 years ago
5 0
For wut exactly are you searching for negro
ivolga24 [154]3 years ago
3 0
Developers? For what?
You might be interested in
Which is NOT a valid compute shape option within the Oracle Cloud Infrastructure (OCI) compute service
inessss [21]

The option that is not a valid compute shape option within the Oracle Cloud Infrastructure (OCI) compute service is;

A: Container Instance

<h3>Cloud Computing</h3>

Cloud computing is simply a system that makes use of the Internet to store, manage and access data from a remote server on the internet.

Now, this cloud system infrastructure makes use of middleware software to ensure that there is proper connectivity between devices and computers connected via the cloud.

Finally there are different types of cloud computing shape but among the given options the only one that is not a type is Option A.

The missing options are;

A) Container Instance.

B) Bare Metal.

C) Dedicated Virtual Machine Host.

D) Virtual Machine.

Read more about cloud computing at; brainly.com/question/19057393

6 0
2 years ago
If Twitter were to exclusively use e-mail, collaborative computing, and other computer connections to connect geographically sep
sweet-ann [11.9K]

Answer:

Virtual is the correct answer for the above question.

Explanation:

A Virtual organization is a collection which is used to connect the geographical people, organizational units, employees, individuals and groups for some communication purpose. Virtual means that there is some existence like physically but it is not physically present. So the organization also connects the person and gives the real scenario with the help of some software for communication.

The question states that if twitter uses email and other computing connections to connect people globally then it comes in the Virtual department because it follows the concept of the virtual department. Hence Virtual is the correct answer.

5 0
3 years ago
Name the contributory components that are considered when determining an E/M code; they are not considered key components:
Vika [28.1K]

Answer:

time

Explanation:

E/M code is known as the evaluation and management code. The E&M code may be defined as the medical coding system which supports the medical billing process.  Every new patient is assigned a E/M code. The components that are not considered for determining the E/M code are coordination of care, the counselling, time and the nature of presenting problem.

7 0
2 years ago
__________ filtering requires that the filtering rules governing how the firewall decides which packets are allowed and which ar
DIA [1.3K]

Answer:

Static

Explanation:

A computer or system administrator who want packets to be filter have to set or configured a filtering rules which will enable and allow the firewall to decide on which of the packets that will be allowed to function and the packets that will be denied not to function to be developed and as well installed on the firewall have to make use of what is called STATIC FILTERING reason been that STATIC FILTERING make it of necessary that the filtering rules should be developed and installed with the firewall.

6 0
2 years ago
Which key serves as both toggle and manipulative key
bogdanovich [222]

Answer:

wheres the picture?

Explanation:

I need a picture 2 answer

7 0
3 years ago
Read 2 more answers
Other questions:
  • Jennifer’s company currently uses Windows Active Directory to provide centralized authentication, authorization, and accounting
    7·1 answer
  • Which term is used to describe a password-protected, encrypted data file that verifies the identity of the sender of a message?
    8·1 answer
  • How many responses does a computer expect to receive when it broadcasts an ARP request?why?
    12·1 answer
  • 18. When you turn off the power to a computer and unplug it at night, it loses the date, and you must reenter it each morning. W
    7·2 answers
  • Host Y sends the first TCP ACK message for the transaction?<br><br> a. true<br><br> b. false
    9·1 answer
  • The identification of the technology management framework contain?
    6·1 answer
  • Jonathan is in the process of creating a photo of a fluttering flag with cars moving around in the background. He wants the flag
    13·2 answers
  • What describes Accenture's approach to automation?
    9·2 answers
  • Which three statements are true of lossless compression?
    6·1 answer
  • On a leading-trailing system technician A says that both shoes do equal work when stopping while going in reverse. Technician B
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!