1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margarita [4]
3 years ago
9

Point out the wrong statement :

Computers and Technology
1 answer:
hoa [83]3 years ago
8 0

Answer:

d. None of the mentioned

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Infrastructure as a Service (IaaS).

3. Software as a Service (SaaS).

All of the following statements are true and correct because they are standard internet protocols;

I. Virtual appliances are becoming a very important standard cloud computing deployment object. This depicts the Platform as a Service (PaaS).

II. Cloud computing requires some standard protocols.

III. Cloud computing relies on a set of protocols needed to manage interprocess communications.

You might be interested in
C. There are two types of computer on the basis of size. true or false​
Veronika [31]

Answer:

False

Explanation:

Different factors, such as processing power, information processing, and the component (CPU) utilised in computers, are used to classify computers. Micro-computers, Mini-computers, Main-frame computers, and Super-computers are divided into four categories based on the components utilised and functionality of the computers.

4 0
2 years ago
What happens during an Active object's animation sequence action?
RoseWind [281]

Answer:

B. The Active object's animation stops looping.

Explanation:

As the new event happens, the loop tells it to happen by stopping. And hence, B is the correct option out here. Neither A or C and Nor D is the correct option. The animation does not end here, and the next event takes place. Also, the active object's animation does not change the speeds. Hence, the correct option here is certainly the B.

4 0
3 years ago
HELP ME PLEASE PLEASE PLEASE!!!! IM BEGING YOU!!!!
lora16 [44]

Answer:

Photo metadata is a set of data describing and providing information about rights and administration of an image. It allows information to be transported with an image file, in a way that can be understood by other software and human users.

Explanation:

4 0
3 years ago
In order to be compliant with the NIST publications, policies must include key security control requirements. One of these key r
rodikova [14]

Answer:

The answer is "Option A".

Explanation:

A comprehensive collection of principles, guidelines, proposals, and studies on information and information systems privacy and safety are produced and carried out in the NIST publications.

  • The FIPS management standards for federal information and security laws contain various technical reporting sequences.
  • This process takes place after a plan is identified, reviews are carried out and risk analysis is performed.
8 0
3 years ago
1.How do we insert pictures in a word document ?<br>2.How to print a document in a word document? ​
Olenka [21]

Answer:

Explanation:

Place your insertion point where you want the image to appear.

Select the Insert tab.

Click the Picture command in the Illustrations group. The Insert Picture dialog box appears.

Select the desired image file, then click Insert to add it to your document. Selecting an image file.

6 0
3 years ago
Other questions:
  • Drag each connector name to match the connector type shown.
    14·1 answer
  • The keyboard and the mouse____ parts of a computer ​
    8·1 answer
  • What was the original motivation for developing the internet?
    7·1 answer
  • Match the file extensions to the file types. Some file types may be used more than once.
    11·1 answer
  • Which program will have the output shown below?
    12·2 answers
  • Choose the correct term to complete the sentence.
    10·1 answer
  • Calculate the heat energy required to raise the temperature of 5 kg of water from 20℃ to
    5·1 answer
  • 1. what do to call the process of preserving food by soaking the raw ingredient in salt and water solution.
    14·1 answer
  • if a hacker wants to exploit the TCP three-way handshake, what is the most effective way to go about it?
    15·1 answer
  • Programming that relies on the use of objects and methods to control complexity and solve problems is known as what type of prog
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!