1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Phantasy [73]
3 years ago
6

Which of the following cloud features is represented by leveraging remote monitoring and system tuning services?

Computers and Technology
1 answer:
vovikov84 [41]3 years ago
7 0

Answer:

Reliability

Explanation:

You might be interested in
What I Can Do
Debora [2.8K]

Step 1.

Purchase Requlsition

Step 2.

Requisition Review

Step 3.

Solicibation process

Step 4.

C'valuation and process

Step 5.

Order Management

Step 6.

Involve approvals and disputes

Step 7.

Record Keeping

Explanation:

Hope it help

8 0
2 years ago
Which of the following is not a standard method called aspart of the JSP life cycle*
Kazeer [188]

Answer:

*jspService()

Explanation:

These are the steps in JSP life cycle.

1. Conversion JSP page to Servlet .

2.Compilation of JSP page(test.java)

3.Class is loaded (test.java to test.class)

4.Instantiation (Object is created)

5.Initialization (jspInit() method is only called once at the time of servlet     generation )

6.Request processing(_jspService() method is used for serving requests by JSP)

7.JSP Cleanup (jspDestroy() method is used for removing JSP from use)

There is no *jspService() method in the JSP life cycle.

8 0
4 years ago
What is meant by close to 75% of all viruses is contracted through friendly means?
snow_lady [41]

Answer: This means that even though we believe the information is coming from a trusted source, it could still contract a virus due to someone else hacking it or the original sending not being aware of the virus.

Explanation: Just because information comes from a trusted/friendly source does not mean the information is clear of potential threats. Viruses are able to hide in information and the sending may not be aware that the virus is hiding in the information.

4 0
4 years ago
The internet is an example of
DochEvi [55]
A large multi user program
6 0
3 years ago
Read 2 more answers
Does white space have visual weight? Yes or No
Shtirlitz [24]

Answer:

no. (more info below)

Explanation:

white space appears to have no visual weight because it's seen as empty. Every body put in the room will appear to be heavier because of the volume surrounding it.

hope this helped!

4 0
4 years ago
Read 2 more answers
Other questions:
  • What command would you use to make a secure shell connection to the ubuntu client machine? ()?
    9·1 answer
  • 2) Describe how data becomes knowledge.​
    10·1 answer
  • What will you personally do to make your peers aware of the seriousness Of teen crashes?
    9·1 answer
  • Which of the following is not a component of Google Display ads' value proposition?
    9·1 answer
  • Why is it a good idea to defrag your hard disk regularly?
    9·1 answer
  • What is unique about the TODAY and NOW functions?
    15·2 answers
  • Which of the following is adoptable in Mindanao only?​
    5·1 answer
  • What is the difference between spyware and adware?
    8·2 answers
  • 1. Wash all work surfaces with a_______ wrung in hot soapy water.
    9·1 answer
  • What is containment and why is it part of the planning process
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!