1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Daniel [21]
2 years ago
8

Which term refers to a cloud-native, streamlined technology for hosting cloud-based applications, where a server runs for short

bursts only when needed by an application or service
Computers and Technology
1 answer:
PilotLPTM [1.2K]2 years ago
8 0

Answer:

Serverless computing.

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Infrastructure as a Service (IaaS).

3. Software as a Service (SaaS).

The three (3) main characteristics of cloud computing are;

I. Measured service: it allows cloud service providers to monitor and measure the level of service used by various clients with respect to subscriptions.

II. Resource pooling: this allows cloud service providers to serve multiple customers or clients with services that are scalable and provisional.

III. Elasticity: this is the ability of the cloud computing service to be flexible and adaptive to the traffic or requests from the end users.

Serverless computing is a term which refers to a cloud-native and streamlined technology that is designed typically for hosting cloud-based applications, in which a server operates for short bursts only when needed by an application or service. Serverless computing is used for the allocation of machine resources on demand.

You might be interested in
FOR A BRAINLIEST
Ludmilka [50]

A sample word problem to calculate the volume and surface area of a three-dimensional object would be: "A logistics company has a wide area that is 300m^2 and has a parking space that is 50m in height and is 12 feet long. Find the volume of the parking space"

<h3>What is a Word Problem?</h3>

This refers to the use of words that describes a real scenario that would lead to a mathematical calculation.

Hence, to make a sample word problem based on the given description, the above description should be helpful, and remember that \pi is 3.142 when doing your calculations.

Read more about word problems here:

brainly.com/question/13818690

#SPJ1

7 0
1 year ago
• What is the difference between primary storage, secondary storage, and off-line storage
sergiy2304 [10]


Primary storage refers to your RAM it is internal storage.

Secondary storage is any storage that is not the primary storage that permanently stores data. Examples are hard drive, tape disk drive, floppy disk drive  and compact disk drive. 

Off-line storage refers to any device that stores data that is not permanently attached to the computer. Example flash drives, The data remains on the storage device and can be connected to a different computer. 

3 0
3 years ago
2. An evil twin attack that broadcasts a legitimate SSID for an unauthorized network is an example of what category of threat? A
avanturin [10]

Answer:

A. Spoofing

Explanation:

Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.

IP spoofing involves an attacker trying to gain unauthorised access to a system by sending messages with a fake or "spoofed" IP address to make it look like the message came from a trusted source, such as one on the same internal computer network, for example.

Email spoofing often involves things like requests for personal data or financial transactions. The emails appear to be from trusted senders such as customers, coworkers, or managers but they are actually from cyber criminals who deliberately disguise themselves to gain your trust and your help with the action they want you to take

7 0
3 years ago
Business cards are generally designed so that this item stands out the most.
Sloan [31]
The D. Company Name most likely stands out on a business card with an address or such in smaller font below. A logo does nothing for a business card if a potential customer doesn't even know the name of the business. While logo's are often present on a business card, the company name is far more crucial to enunciate clearly which is of course, important for business's attraction of new customers.

So D. Company Name is my final answer!

Hope this helps! ;)
3 0
3 years ago
What term is used to describe a chipset developed and promoted by the U.S. government from 1993 to 1996 as an encryption device
Flauer [41]

Answer:

Clipper Chip Kerberos National Information Infrastructure (NII)

Explanation:

The Clipper chip was developed by the NSA (National Security Agency) for enciphering and deciphering messages. It was promoted for voice transmission in telecommunications companies. The Clipper chip was announced in 1993, not all consumers and manufacturers embraced it and only last to 1996.

3 0
3 years ago
Other questions:
  • Which of the following jobs are most likely to be in greater demand due to the increasing prevalence of mobile computing? deskto
    13·1 answer
  • At what point is an idea protected by copyright?
    7·2 answers
  • Which ipv6 static route would serve as a backup route to a dynamic route learned through ospf?
    12·1 answer
  • The network topology in which each device is connected directly to a central network switch
    9·1 answer
  • Que funcion tiene la sombrilla forrada de aluminio​
    6·1 answer
  • Help please fast
    6·2 answers
  • True false.
    10·2 answers
  • Does anyone have Rblx? if so write your username
    6·1 answer
  • The most widely used computer device​
    6·2 answers
  • Which discipline focuses on the design of computer hardware?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!