GuardIN is an IT security firm. It deals with highly secure data for a wide variety of software and e-commerce agreements, trademark licenses, and patent licenses. GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself. The cloud also needs to be designed in such a way that all users of the organization can access it without any lag. Which of the following cloud computing options would be most suitable for GuardIN?
A) A public cloud
B) A community cloud
C) A hybrid cloud
D) A private cloud

Answers

Answer 1

Answer:

D) A private cloud

Explanation:

Note we are told that GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself.

Thus, to be able to manage the cloud infrastructure itself; it implies buying it's own hardware equipments, which means it is best to use a private cloud computing option.

Doing so would give GuardIN the opportunity to design the cloud storage in a way that all users of the organization can access it without any lag.


Related Questions

MULTIPLE CHOICE When you log in to a browser, such as Google Chrome, you are accessing a profile that you can save and use on many different devices. What are some of the personal preferences you can save to your user profile for a browser? Select all that apply.

Answers

Answer:

The personal preferences that can be saved are

A. Customize your bookmark bar

C Change your home page

D Enable safe browsing in your privacy setting

Explanation:

The Bookmark manager can be used for personal customization of the bookmarks in chrome

The Bookmark manager is located within the customization button located at the top right hand corner of the browser under bookmarks

The personally preferred homepage can be selected under appearance category in the settings menu

The enable safe browsing preferences can be found under privacy and security sub menu within the settings menu window.

Suppose you have the following variables defined: a = 100 b = 50 Write a Python if/else statement to assign the smaller of a and b to the variable m.

Answers

Answer:

a, b = 100, 50

if a < b:

m = a

else:

m = b

The program which assigns the smaller of the values in variable a and b using an if/else statement ls :

a = 100

b = 50

#assign the 100 and 50 to the variables a and b respectively

if a > b :

# the if statement checks if the variable a is greater the value on variable b

m = a

# if true assign the value of a to the variable m

else :

# if otherwise, then b would be greater

m = b

#assign the value of b to m

#the sample run of the program is attached

print(m)

Learn more :https://brainly.com/question/15727806

A technician is troubleshooting a Windows computer experiencing slow startup. Which of the following steps should the technician take first to determine whether startup processes are responsible for the slow startup?
A. The technician should permanently disable all startup processes in System Configuration.
B. The technician should measure the time it takes to start the system using a normal boot and compare that time against the time it takes for the system to perform a clean boot.
C. The technician should back up user data and reinstall Windows and all applications.
D. The technician should disable all scheduled tasks in Task Scheduler and reboot the system.

Answers

Answer:

The correct option is;

The technician should measure the time it takes to start the system using a normal boot and compare that time against the time for the system to perform a clean boot.

Explanation:

Clean boot is the process of starting the Windows operating system where the number of drivers as well as startup programs enabled are minimal in order to ascertain if the cause of a slow system startup is due startup interfering programs or drivers

A clean boot operating system startup and a startup in Safe Mode are similar with the difference being the higher level of control on what to run during start up offered by clean boot to aid troubleshooting startup issues.

If you have a 3D printer please show me a vid of you making something because I'm interested in getting one. Ty! Also can someone show me how to put more points in a question that I ask on Brainly?

Answers

Explanation:

Too add more points on your brainly question(phone), type your question

Then, see on your top left, you can see the points. It will show 10,which means you have to lose 10 points which is the minimum points for one question. If you are generous to give more points, click on it the you can scroll till the maximum point which is 100..but each points you give will divide 2.

For example, you just loose 10 points for your question but I only got 5 points

Hope you understand this

I'm not sure with laptop

HAVE A GOOD DAY!

Consider a text editor that saves a file whenever you click a save button. Suppose that when you press the button, the editor simply (1) animates the button "down" event (e.g., by coloring the button grey), (2) uses the write() system call to write your text to your file, and then (3) animates the button "up" event (e.g., by coloring the button white). What bad thing could happen if a user edits a file, saves it, and then turns off her machine by flipping the power switch (rather than shutting the machine down cleanly)

Answers

Answer:

The answer to this question can be defined as follows:

Explanation:

The write() method guarantees you to updates the memory of both the kernel, and may not ensure which updates were flushed through stable storage. Unless the client instead switches on either the monitor but views the file, it displays the file, to combines from older and newer versions will be shown. The very first two cases will be deemed "bad" because the user probably can not expect them after completing the save.

A network administrator was told by the Chief Information Officer (CIO) to set up a new office with a network that has redundancy. What topology would BEST meet the CIO's requirement?

Answers

Answer:

"Mesh topology" is the correct answer.

Explanation:

A mesh topology seems to be a network configuration where there has been an interconnection between each hardware and communications system. This topology configuration allows the distribution of many of these signals, although one of the connexons starts going down.This topology needs to connect each destination to any other end destination, thus creating a completely pointless channel.

Which method would be the BEST to protect security information and event management (SIEM) log data at rest from tampering by authorized users?A. Access control lists (ACLs) on log data drivesB. Deployment of write once read many (WORM) drivesC. Disk encryption using hardware security modules (HSM) on log data drivesD. Implementing the principle of least privilege on log data drives

Answers

Answer:

Option B (Deployment of write once read many (WORM) drives) is the appropriate one.

Explanation:

SIEM application goods/services consolidate safety information management (SIM) with security event management (SEM) throughout the area of device protection. We include an overview including its known vulnerabilities created by users and network equipment in actual environments.No quantity of administrative intervention will alter the substance on something like a WORM disc, even by physical disc disruption or failure. That would be the better-suggested choice.

Ryan is creating a website for an automobile company. He wants to include media files on the web page and make the page appealing to the viewers.
​Ryan wants a particular embedded media clip to automatically restart when it has finished playing. Which of the following HTML audio and video element attributes must Ryan include in his code to accomplish this?
A. ​src
B. ​loop
C. ​controls
D. ​preload

Answers

Answer:

I think it's preload :P

Explanation:

But just be sure with some sources ok ! :♡

What number system do people in America use?

Answers

Answer:

Base-10 (decimal)

Explanation:

America uses the imperial system.

The majority of the rest of the world uses the metric system (base 10).

A computer program is said to learn from experience E with respect to some task T and some performance measure P if its performance on T, as measured by P, improves with experience E. Suppose we feed a learning algorithm a lot of historical weather data, and have it learn to predict weather. In this setting, what is T

Answers

Answer:

The weather prediction task

Explanation:

Note: Example: playing checkers.

E = the experience of playing many games of checkers

T = the task of playing checkers.

P = the probability that the program will win the next game.

Gregor installed a third stick of known-good RAM into his Core i7 system, bringing the total amount of RAM up to 3 GB. Within a few days, though, he started having random lockups and reboots, especially when doing memory intensive tasks such as gaming. What is most likely the problem

Answers

Answer:

The speed or quality was different.

Explanation:

The new ram that he installed most likely had a different rate, or was a different quality than the old ram.

Which of the following for-loop headers results in equivalent numbers of iterations: A. for (int q = 1; q <= 100; q++) B. for (int q = 100; q >= 0; q--) C. for (int q = 99; q > 0; q -= 9) D. for (int q = 990; q > 0; q -= 90) a. A and B. b. C and D. c. A and B have equivalent iterations and C and D have equivalent iterations. d. None of the loops have equivalent iterations.

Answers

Answer:

b

Explanation:

C and D have equivalent iterations

C:       D:

99    990

90      900

81      810

72      720

63      630

54      540

45      450

36      360

27      270

18      180

9       90

Chapter 21 discusses four aspects of the speaking situation you should take into account when planning the graphics you'll use in an oral presentation including the length of the presentation, the size and layout of the room, and the available equipment. What is the last aspect?

Answers

Answer:

The answer is "audience aptitude and experience "

Explanation:

The presentation is the ability to provide a variety of audiences with successful and stimulating interactions. The main objective of an oral presentation is to talk formally to a live audience about a particular subject. You have to write an oral speech that engages the audience and fulfills your goals.

In this type of presentation, the Listener-centric concept is effective as the productivity of a speaker is enhanced by creating and presenting the speech throughout the proper manner.

Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binary. For an integer x, the algorithm is: As long as x is greater than 0 Output x modulo 2 (remainder is either 0 or 1) Assign x with x divided by 2

Answers

Answer:

Following are the code to this question:

def binarynumber(num):#defining a method binarynumber that accepts a parameter num

   x=""#defining a string variable x

   if (num!=0):#defining if condition to check number not equal to 0

       while (num>=1):#defining a loop that check value is grater then equal to one

           if (num %2==0):#defining if condition to check num is even

               x=x+"0" #add string value 0 in num variable

               num=num/2 #divide the value by 2

           else:#defining else block

               x=x+"1"#add string value 1 in num variable

               num=(num-1)/2#first subtract 1 into num variable then divide the value by 2

   else:

       x="0"#assign string value 0 in num variable  

   return "".join(reversed(x))#return value

num = int (input ("Enter any number: "))#defining num variable that input the integer value

print (binarynumber(num))#using print method to call method binarynumber with passing num parameter

Output:

Enter any number: 12

1100

Explanation:

In the above python code a method "binarynumber" is declared, in which the "num" variable passes as the parameter inside the method a string variable "x" is declared that stores all converted values. Inside the method and if the block is declared that checks number value is not equal to 0 if this condition is false then it will add string value and reverse its value. Or if the condition is true it defines a while loop that calculates the given number binary digits and returns its value. At the last step, the num variable is declared that inputs the integer value from the user end and calls the method by using the print method.    

A company has a network printer that is utilzed by several departments. Although the printer shows online and other departments can access the printer, the accounting group is unable to print to this network printer. Which of the following would the technician use to resolve the problem?
a. The printer needs a maintenance kit repalced.
b. The TCP/IP print spooler service need to be restarted.
c. The security settings for the print spooler need to be modified to include the department.
d. Replace the network cable on the printer

Answers

Answer: c. The security settings for the print spooler need to be modified to include the department.

Explanation:

The print spooler makes Windows computer enable to interact with the printer, and to commands the printer for print jobs .

If all the other departments can access the printer,  but not the accounting group, then the technician should check the security settings for the print spooler and modify it accordingly to include the accounting group  .

Hence, the correct answer is c. The security settings for the print spooler need to be modified to include the department.

You are a technician working for a large company and you notice a user has left a Post-it note attached to her monitor of a new password that she was just given. What should the technician do

Answers

Explanation:

When you notice that  a user has left a Post-it note attached to her monitor of a new password that she was just given, you should immediately inform this to your senior authority. As this is potent sign of virus or malware threat to the system.

Write a method, getFirstLine, that is passed a String argument and that returns the first line. (Recall that lines are terminated with the "\n" character.) Assume that the argument contains at least one complete, newline-terminated line.
My Solution:
public String getFirstLine(String a)
{
String[] myLines = a.split("\n");
return(myLines[0]);
}

Answers

Answer:  The answer to this question can be given as:

Method definition :

String getSecondLine (String aString) //define function getSecondLine()

{

return aString.substring(aString.indexOf("\n") + 1, aString.indexOf("\n") + 1 + aString.substring(aString.indexOf("\n") + 1, aString.length()).indexOf("\n"));

//return value.

Explanation:

Lee finishes entering all the data. Next, he wants to format the header row so it is easier to read and stands out from the rest of the table. What should Lee do to accomplish this task?

Answers

Answer:

A: Add shading to the top row

B: Change the style of the table

Explanation:

Just got the question myself and got the answer from it

Answer:

A B

Explanation:

i just did the assignment└|∵|┐♪

A _____ cloud allows an organization to take advantage of the scalability and cost-effectiveness that a public cloud computing environment offers without exposing mission-critical applications and data to the outside world.

Answers

Answer:

Hybrid

Explanation:

Hybrid cloud is a solution that combines a private cloud with one or more public cloud services, with proprietary software enabling communication between each distinct service.

Assuming that a valid price should be between 30 and 50, what does the following code snippet do? final int MIN_PRICE = 30; final int MAX_PRICE = 50; int price = 0; Scanner in = new Scanner(System.in); System.out.print("Please enter the price: "); price = in.nextInt(); if (price < MIN_PRICE) { System.out.println("Error: The price is too low."); } else if (price > MAX_PRICE) { System.out.println("Error: The price is too high."); } else { System.out.println("The price entered is in the valid price range."); } This code snippet ensures that the price value is between 30 and 50. This code snippet only ensures that the price value is greater than 30. This code snippet only ensures that the price value is less than 50. This code snippet ensures that the price value is either less than 30 or greater than 50.

Answers

Answer:

This code snippet ensures that the price value is between 30 and 50.

Explanation:

If the price is not between 30 and 50 then the output will be "Error:  ...."

What is the outcome of the following code snippet? boolean val1 = true; boolean val2 = false; while (val1) { if (val1) { System.out.println("Hello"); } val1 = val2; } No output will be displayed because of a compilation error. Hello will be displayed only once. Hello will be displayed infinite times. No output will be displayed even after successful compilation of the code snippet.

Answers

Answer:

Hello will be displayed only once.

Explanation:

Look at the picture*

You asked your colleague to provide feedback on a blog post you recently wrote. When they sent you their feedback, they made edits directly in the doc. Is this a best practice for a content editing process?

Answers

Explanation:

This question can have both answers that is yes as well as no.

1.Yes, it can serve as an editor who completes your content and ensures it will read well to others.

2. No, the editor should have tracked changes which would have shown you where they would apply recommended edits.

Which of the following statements is false? a. As of Java SE 8, any interface containing only one method is known as a functional interface. b. There are many functional interfaces throughout the Java APIs. c. Functional interfaces are used extensively with Java SE 8â s new lambda capabilities. d. Anonymous methods provide a shorthand notation for creating lambdas.

Answers

Answer:

d. Anonymous methods provide a shorthand notation for creating lambdas.

Explanation:

Java SE 8, is Standard Edition of Java. It is a computing platform for deployment of portable code for servers. The statement that is not correct is anonymous method provide shorthand notation. Lambda expression are added in Java 8, which enables to treat functionality as method argument code or data. Lambda expression can be passed around as it is an object executed on demand.

3. Write the qbasic program for following:
[10]
a) To find square of 3.
b) To print and display square and cube of 4.
c) To print and display simple interest where principle is 4000 rs, time is 2 years and
rate is 5%.
d) To find sum, subtract, product and division of 8 and 4
e) To find and print sum and product of two input numbers.


it's a really important assignment and I will need all the answer. I will follow, give 5 star and a heart for the first person who gives the answer. please be quick. it is important​

Answers

Answer:

Hi there!!!

I hope it helps you...

You are working the 8:00 AM shift at the help desk. An irate user who fails to identify himself calls in claiming that his workstation is malfunctioning and that you need to fix it NOW. What is the first action you should take?

Answers

Answer:

Calmly ask him for his name and a more detailed explanation of the problem.

Explanation:

Since in the question,  it is mentioned that the anger use who fails to identify himself and claim that his workstation is malfunctioning and want to fix it now

Now the action which would be taken is to ask his name in a calmy manner and understand what the actually problem he is suffering by understanding it in a detailed way

Therefore according to the given case, the correct option is d.

Importance of taking correct body measurement....

Answers

Taking correct body measurements is of key importance especially to models and future models. So that they remember about the leftover weight in their body from thanksgiving , now when they take correct body measurements , they are aware and will counter such things to be better.

can a 0.90 GB storage left android phone download an app of 28 MB plsssss fast I will give you brainliest why and why not?

Answers

Answer:

Yes

Explanation:

0.9 GB = 900 MB. That is a plenty of space for a 28 MB app.

A customer calls you and states that her laptop screen is very dim. In order to avoid going to the client's site, which of the following is the first action you should recommend to the customer to perform?
1. Use function keys
2. Set encryption
3. Restart the system
4. None of above

Answers

it depends on the brand of laptop,If it is standard use function key if not None of the above

B. Imagine yourself to be a tube light. Write a short paragraph about your life. (50 to 80 words)
plese help me​

Answers

Do you know LED light- I mean the tubelight that people perch and switch it on. It is used in offices, homes, schools and anywhere there are tube lights but I am something different. I am that light that shines on children’s head.

Ok, it is not actually a light in children’s head. It’s when they think of an idea so they are switching me on and they spread that means they are allowing me to shine. My head means the base is the brain that tells me that this idea is there so I shout and spread it.

Like that I was also a light in a boys head his name was Rahul. Rahul was a boy that when his mind is on studies he can top in his class but he was not understanding that he was only focusing on his sports.

One day in the classroom didi said that there is a problem that in our school there is a problem that out toilets are stinking and we need help from you children. All the lights around me were flickering because all the children were thinking of ideas. I was the only one of them who was not flickering. Rahul switched me on and let me shine, he spread it. I also know that he is not going to shatter me into pieces. He is going to persevere and he did it.

From that day, it was my daily life..on off..on off..on off..

A user reports that a file they shared out on their computer for another network user is not accessible to the third party. The user insists they specifically gave this third party Allow rights for Read and Write access. Which of the following could explain the problem at hand?
A. The parent folder has explicit Allow rights set for this user.
B. The parent folder has explicit Deny rights set for this user.
C. The user forgot to share the parent folder and only shared the specific file.
D. The parent folder likely has the "archive" attribute enabled.

Answers

Answer:

i think it's going to be c

Explanation:

Other Questions
Why is Giovanni Bellini known as the painter of natural light? 5 1/2 to improper fraction You have a $4 million portfolio consisting of a $100,000 investment in each of 20 different stocks. The portfolio has a beta of 1.1. You are considering selling $100,000 worth of one stock with a beta of 0.9 and using the proceeds to purchase another stock with a beta of 1.4. What will the portfolios new beta be after these transactions? Show your work. Find the perimeter and area of the figure. Round to the nearest tenth if necessary. 33.7 mm; 108 mm2 33.7 mm; 54 mm2 30.7 mm; 50.2 mm2 33.7 mm; 53.2 mm2 Describe the process of scientific inquiry ? Mediterranean climate zone. Where is it found Which relative dating principle states that sedimentary layers lower in a sequence are older than the sedimentary layers on top of (or overlying) them? Read the passage and answer the question that follows. Winter Dreams by F. Scott Fitzgerald (excerpt) "Isn't shea pretty girl, any more?" "Oh, she's all right." "Look here," said Dexter, sitting down suddenly, "I don't understand. You say she was a 'pretty girl' and now you say she's 'all right.' I don't understand what you meanJudy Jones wasn't a pretty girl, at all. She was a great beauty. Why, I knew her, I knew her. She was" Devlin laughed pleasantly. "I'm not trying to start a row," he said. "I think Judy's a nice girl and I like her. I can't understand how a man like Lud Simms could fall madly in love with her, but he did." Then he added: "Most of the women like her." Dexter looked closely at Devlin, thinking wildly that there must be a reason for this, some insensitivity in the man or some private malice. "Lots of women fade just like that," Devlin snapped his fingers. "You must have seen it happen. Perhaps I've forgotten how pretty she was at her wedding. I've seen her so much since then, you see. She has nice eyes." A sort of dulness settled down upon Dexter. For the first time in his life he felt like getting very drunk. What does the emphasis on the word pretty and Dexters reaction to the news of Judys situation tell readers about his attachment to her? A. Dexter no longer loves Judy but still feels tenderness and pity toward her. B. Dexter feels anger about Judys situation and wants to avenge her mistreatment. C. Dexter was deeply in love with Judy and wanted to rescue her from her bad marriage. D. Dexter was more attached to the dream of possessing Judy and did not actually love her. A simple random sample from a population with a normal distribution of 102 body temperatures has x overbarequals98.40degrees Upper F and sequals0.66degrees Upper F. Construct an 80% confidence interval estimate of the standard deviation of body temperature of all healthy humans. Is it safe to conclude that the population standard deviation is less than 1.80degrees Upper F? One problem in the interstate trucking industry is the number of trucks that return after making a delivery with an empty truck. There is a website where independent interstate truckers can look for loads that they can carry with them on their return trip. Because the trucks would be returning empty (and inefficiently), truckers who use this website to get business that they would not have had without it and charge a reduced shipping rate. This reduced rate is an example of: In the election of 1864, candidate George McClellan promised toa.crush the South swiftly.b.stop the fighting and negotiate.c.nullify the Emancipation Proclamation.d.punish the South at wars end. Question 5 of 24Which theory accounts for the difference in salary paid to medical doctorsand child-care workers?A. Elastic and static desireB. Need and wantO C. Supply and demandO D. Regulation and distribution The graph of g(x) is a transformation of the graph of f(x)=4x. factor the following trinomials x2-18x+81 Transactions are typically processed either [A] all together for a defined time window (e.g. end of a day or week) or [B] processed as each transaction occurs. The second method [B] is called ________ processing. which term describes a female arctic fox (c) He, Na, Mg (increasing order of melting point). If your introduction is not ___________, it will distract the audience and you may lose goodwill and credibility. Different cereals are randomly selected and the sugar content in grams of sugar per grams of cereal are obtained. Use a .05 significance level to test the claim of cereal lobbyist that the mean sugar content for all cereals is less than .3 g. Data set: 0.03, 0.24, 0.30, 0.47, 0.43, 0.07, 0.47, 0.13, 0.44, 0.39, 0.48, 0.17, 0.13, 0.09, 0.45, 0.43 Find the 9th term geometric sequence 1,1/2,1/2^2w. Please show the steps.