1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
algol [13]
4 years ago
10

_____ is a method of delivering software, in which a vendor hosts the applications, and customers access these applications over

the Internet.
A. Software-as-a-service
B. Prototyping
C. Leasing applications
D. Service oriented architecture
E. Buy the applications
Computers and Technology
1 answer:
marysya [2.9K]4 years ago
3 0

Answer:

Option A: Software-as-a-service

Explanation:

Software-as-a-service (SAAS) is one of the cloud computing business models. The software is not delivered as a product hosted in the client machine. Instead, a customer just pays a subscription fee (sometimes free for limited quota) to gain access to the software which is hosted in a remote server maintainer by software vendor.

One benefit of SAAS is that the software vendor will usually responsible for software maintenance and update. The customer has no longer require to pay extra cost to upgrade the software. So long as the subscription is still valid, a customer can always access to the newest features of software.    

Some examples of SAAS which is popular include DropBox, Google App, DocuSign, Microsoft Office 365 etc.

You might be interested in
If we can lock a file, we can solve the race condition problem by locking a file during the check-and-use window, because no oth
yKpoI14uk [10]

Answer:

A file can only be locked out to other users or processes only if it's already open, meaning it's in use as a resource during the time window and therefore it's impossible solving the race condition problem by locking the file during the check-and-use window.

Hence, during the check-and-use process, it's impossible to lock a file.

In conclusion, any lock created can be ignored by the malicious process.

5 0
3 years ago
Example: An amount of $1,500.00 is deposited in a bank paying an annual interest rate of 4.3%, compounded quarterly. What is the
maw [93]

Answer:

the answer is

Explanation:

3 0
4 years ago
Write a script that creates a user-defined database role named OrderEntry in the MyGuitarShop database. Give INSERT and UPDATE p
vesna_86 [32]

Answer:

USE MyGuitarShop ;

CREATE ROLE OrderEntry ;

GRANT INSERT ON Orders ,OrderItems  TO OrderEntry ;

GRANT UPDATE ON Orders ,OrderItems TO OrderEntry ;

GRANT SELECT ON Orders ,OrderItems TO ALL;

Explanation:

USE MyGuitarShop ;

This statement is used to make MyGuitarShop  as the current database

CREATE ROLE OrderEntry ;

This statement creates new role called "OrderEntry".Roles are useful in database to grant permissions for users on particular objects of the database.

GRANT INSERT ON Orders ,OrderItems  TO OrderEntry ;

GRANT UPDATE ON Orders ,OrderItems TO OrderEntry ;

above two GRANT statements are used to grant Insert,Update permissions to the Role "OrderEntry " for the tables Orders ,OrderItems.All the users of Role "OrderEntry" are able to grant Insert,Update on the tables Orders ,OrderItems.

GRANT SELECT ON Orders ,OrderItems TO ALL;

above GRANT statement is used to give select permission on specified tables to all users.

3 0
4 years ago
What refers to the way that a user gets data from a computer, such as
Vera_Pavlovna [14]

Answer:

Possibly IOT or internet of things. Not 100% sure if I am understanding question fully

Explanation:

4 0
3 years ago
Question 16 (1 point)
Lana71 [14]

Answer:

C) the world wide web.

Explanation:

if you where to google the question it is the definition of the WWW

5 0
4 years ago
Other questions:
  • ¿cuales son la diferencias de programacion estructurada y programacion orientada a objetos?
    10·1 answer
  • In a PowerPoint presentation, it is not possible to add notes that are hidden from the audience's view.
    9·1 answer
  • Why is it a mistake to put e-mail address of people who don't know each other in the "to:" field
    9·2 answers
  • On a pie chart, the different sections or "wedges" show:
    9·1 answer
  • HELP
    13·1 answer
  • (a) [5 pts] Suppose you purchase a wireless router and connect it to your cable modem. Also suppose that your ISP dynamically as
    13·1 answer
  • 2. How is accessing the Internet through a home network and public Wi-Fi similar?​
    15·1 answer
  • 1. Write a 400-500 word research report about Burke High School.
    6·1 answer
  • Questlon 5 of 25
    5·1 answer
  • Using above information, Write a prolog program to answer the following queries. Please note that you cannot simply answer these
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!