1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NARA [144]
3 years ago
9

You have been asked to advise a group of several universities who want to combine research efforts and store data in the cloud.

Which type of cloud solution might be best for them
Computers and Technology
1 answer:
inn [45]3 years ago
4 0

Community cloud is best for a group of several universities who want to combine research efforts and store data in the cloud.

<h3>Community cloud</h3>

Community cloud allows for the flexibility and scalability normally found in a public cloud, but it also limits the number of users to a smaller, trusted group.

  • When multiple organizations with similar objectives want to combine efforts in a cloud, the best choice is generally a community cloud.

Community cloud is best for a group of several universities who want to combine research efforts and store data in the cloud.

Find out more on community cloud at: brainly.com/question/25620318

You might be interested in
Which of the following generally does not apply to all seven domains of an IT infrastructure? Incident response Service level ag
almond37 [142]

Answer:

Option C, Disaster recovery plan

Explanation:

The seven domains of IT are

User Domain

System/Application Domain

LAN Domain

Remote Access Domain

WAN Domain

LAN-to-WAN Domain

Workstation Domain

To these seven domain, the Disaster recovery plan only applies to the LAN-to-WAN Domain as it is vulnerable to corruption of data and information and data. Also, it has  insecure Transmission Control Protocol/Internet Protocol. (TCP/IP) applications and it at the radar of Hackers and attackers

4 0
2 years ago
Plz answer me will mark as brainliest ​
lakkis [162]

Answer:

answered

Explanation:

5 0
3 years ago
Kelly has always used "P4ssw0rd” as her password on her online accounts. Why should she change this? Check all that apply.
const2013 [10]
Answer 1, 2, and 3 are all correct. Hope this helps
6 0
3 years ago
Read 2 more answers
________________ are piece of programs or scripts that allow hackers to take control over any system.
Ber [7]

Answer:

Exploits

Explanation:

Exploits can be explained to be a piece of programmed softwares or scripts that can give hackers the opportunity to take control over any system and exploit this system's vulnerabilities. The vulnerability scanners that hackers use includes, Nessus, Nexpose e.tc.

They use these scanners above to search for vulnerabilities.

3 0
3 years ago
You are a part of the team that is selecting and laying out the facility to make a product. Which of the following would be a co
Leno4ka [110]

4. an adequate amount of storage for raw materials and finished products

5 0
3 years ago
Other questions:
  • e do loop differs from the while loop in that a. the while loop will always execute the body of the loop at least once b. the do
    9·1 answer
  • True or False. A compact disc (CD) stores music in a coded pattern of tiny pits 10−7m deep. The pits are arranged in a track tha
    9·1 answer
  • ____________ provides the architect opportunity to electronically plan and place elements of a building.
    6·2 answers
  • The benefit of host and guest operating system difference is:
    8·2 answers
  • What is the web of trust
    7·2 answers
  • Solve(-8/3)+7/5 please answer​
    5·1 answer
  • A keyboard, mouse, and microphone are examples of ________.
    9·2 answers
  • I need the answer ASAP!!!! I’ll mark brainliest if correct
    13·1 answer
  • Which type of file can be opened directly into Excel?
    15·1 answer
  • 14. How do digital libraries address the problem of digital exclusion?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!