suppose that you are juan at cbi. list and describe three criteria you would use in helping cbi decide whether it should move a particular app to the cloud. justify your criteria.

Answers

Answer 1

Three criteria to consider when deciding whether to move an app to the cloud are: cost, security, and scalability/flexibility.

As Juan at CBI, here are three criteria I would use to help decide whether to move a particular app to the cloud:

Cost: One key factor to consider is the cost of moving the app to the cloud. This includes not only the cost of the cloud provider's services but also any additional costs associated with migration, such as reconfiguring the app or training staff on new processes. Security: Another important criterion is the security of the app and the data it processes. CBI must ensure that the cloud provider has adequate security measures in place to protect the app and its data from cyber threats and data breaches. Scalability and Flexibility: Finally, CBI should consider the scalability and flexibility of the app in the cloud. The cloud offers the advantage of being able to scale up or down quickly and easily based on demand, which can be beneficial for apps with fluctuating usage patterns.

Learn more about cloud here:

https://brainly.com/question/29745873

#SPJ11


Related Questions

Complete the code to check whether a string contains at least one lowercase letter.
valid = False
pw = input("Enter a password: ")
if _ (letter. _ () for letter in pw):
valid = True

1. any
2. some
3. islower
4. isLower

Answers

Answer:

3 islower

Explanation:

The correct code to check whether a string contains at least one lowercase letter is:

valid = False

pw = input("Enter a password: ")

if any(letter.islower() for letter in pw):

valid = True

what is the subject of the computer security act of 1987? a. federal agency information security b. telecommunications common carriers c. cryptography software vendors d. all of the other answers are correct

Answers

The subject of the Computer Security Act of 1987 is a. federal agency information security.

The Computer Security Act of 1987 (Public Law 100-235) was passed by the United States Congress on December 15, 1987, and signed into law by President Ronald Reagan on December 29, 1987. It was a US law governing the security and privacy of sensitive data stored in federal computer systems.

The law's aim was to safeguard unclassified, non-military data on US government computer systems by creating minimum security standards, and it did so by directing NIST (National Institute of Standards and Technology) to establish those standards.

Therefore, the answer is A. Federal agency information security.

Learn more about federal agency information security:https://brainly.com/question/14488312

#SPJ11

the ability to adapt to increases or decreases in demand for processing or data storage is known as .

Answers

The ability to adapt to increases or decreases in demand for processing or data storage is known as "scalability." Scalability refers to the ability of a system, network, or application to handle a growing amount of work or users without experiencing a decrease in performance or stability.

Scalability is important in ensuring that a system or application can handle current and future demands, and can be achieved through various techniques such as load balancing, clustering, and horizontal or vertical scaling.

Data storage refers to the use of physical or digital media to store and preserve digital data, such as files, documents, images, videos, and other types of information. Data storage can be done on various types of storage media, including hard disk drives, solid-state drives, magnetic tape, optical disks, and cloud-based storage solutions.

Learn more about scalability here brainly.com/question/30366143

#SPJ4

element 0 of tensors does not require grad and does not have a grad_fn

Answers

Element 0 of tensors does not require gradients, since it is a constant value and does not need to be optimized. It also does not have a grad_fn (gradient function) because no gradients need to be computed for it.

What is PyTorch

PyTorch is a machine learning and deep learning framework that is widely used in artificial intelligence (AI) applications. PyTorch has two crucial parts, namely the tensor library and the autograd engine. When it comes to the tensor library, a tensor is a multi-dimensional array that can contain any data type.

In PyTorch, tensors can have gradients as well as functions that calculate the gradients. Here, the explanation of the PyTorch tensor with a gradient and the function that calculates gradients is given:In PyTorch, the tensor with gradient is called the Tensor that requires gradient. On the other hand, a tensor without gradient is called the Tensor that does not require gradient.

Tensor that does not require gradient usually contains data that should not be changed, such as input or target data. When backward() is called on a tensor that does not require gradient, PyTorch does not calculate gradients on this tensor.

As a result, it does not have a grad_fn element. For example, if we have tensor x and tensor y in the code below, x and y both require gradient, whereas z does not require gradient:import torch x = torch.ones(2, 2, requires_grad=True) y = x + 2 z = torch.ones(2, 2) print(x) # tensor([[1., 1.], [1., 1.]], requires_grad=True) print(y) # tensor([[3., 3.], [3., 3.]], grad_fn=) print(z) # tensor([[1., 1.], [1., 1.]])

Now, as we can see, y has a grad_fn element and requires_grad=True because the gradients have to be calculated in backward() function. On the other hand, z does not require gradient, and there is no grad_fn element.

Learn more about pytorch at

https://brainly.com/question/28144467

#SPJ11

how many limited edition cookies were released in 2019?

Answers

There were five limited edition cookies released in 2019: Mint Chocolate Chip, Coconut Cocoa, Chocolate Caramel Sea Salt, Oatmeal Raisin and Oatmeal Cranberry.

Each flavor was available for a limited time, usually for a month or two at a time. Each flavor was also accompanied by a fun, whimsical design. The cookies were sold in a special edition pack containing two of each flavor.
you can try to search for news articles or press releases from cookie companies that may have released limited edition cookies in 2019. Look for information about the quantity of the cookies produced and distributed during the year. You can also try to search for information on popular food or cooking blogs that may have covered the topic.

Second, you can search for consumer reviews or posts on social media about the limited edition cookies released in 2019. This may give you some indication of the popularity and availability of the cookies during that year.Third, you can contact cookie companies directly and inquire about their limited edition cookie releases in 2019. They may be able to provide you with specific information about the quantity of cookies produced and distributed.

For such  more questions on cookies :

brainly.com/question/14252552

#SPJ11

compare client/server and peer to peer network architecture in terms of cost,efficiency and network performance

Answers

Both client/Server and P2P network architectures have their advantages and disadvantages. Choosing the right architecture will depend on the specific needs of the organization, including the size of the network, available resources, and the level of control required.

Client/server and peer to peer (P2P) are two common network architectures that are used to connect devices in a network. In terms of cost, P2P networks are more cost-effective as they do not require a centralized server or infrastructure to operate. On the other hand, client/server networks require a dedicated server, which can be expensive to purchase, maintain and operate.

In terms of efficiency, client/server networks are generally more efficient as they provide centralized control over data and resources. This means that access to data and resources can be managed more easily, and it is easier to monitor network activity. However, P2P networks are more decentralized and offer more flexibility, making them suitable for smaller networks with limited resources.

When it comes to network performance, client/server networks generally provide faster and more reliable performance due to the centralized nature of the architecture. P2P networks, on the other hand, can suffer from slower performance as data is distributed across multiple devices, and there is no centralized control over network resources.

Overall, both client/server and P2P network architectures have their advantages and disadvantages. Choosing the right architecture will depend on the specific needs of the organization, including the size of the network, available resources, and the level of control required.

To Learn More About Server

https://brainly.com/question/27960093

SPJ11

2. What are three common characteristics or skills necessary for any career in the Information and Support Services career pathway and why are they important?​

Answers

Common characteristics or skills that are necessary for any career in the Information and Support Services career pathway are;

Technical proficiencyAnalytical skillsCommunication skills

What are the important skills?

Technical proficiency serves as  the ability to use and troubleshoot various hardware and software systems. Individuals in this field must be familiar with a range of technologies, including computers, servers, networking equipment, operating systems, and databases.

Analytical skills is the ability to analyze information, identify problems, and develop solutions. Individuals in this field must be able to gather and interpret data, diagnose issues, and implement solutions.

Learn more about skills  at:

https://brainly.com/question/26061350

#SPJ1

what happens if another interrupt is activated while current interrupt is being served? will the program jump to new interrupt? how does avr handles this kind of situation?

Answers

If a new interrupt is triggered while a current interrupt is being serviced in AVR microcontrollers, the AVR will complete the current instruction and immediately jump to the new interrupt vector if it has a higher priority, based on the Interrupt Priority Levels (IPLs) mechanism.

In AVR microcontrollers, when an interrupt is being serviced and another interrupt is triggered, the AVR will complete the current instruction before acknowledging the new interrupt request. Once the current instruction is completed, the AVR will check for any pending interrupt requests. If there is another pending interrupt request with higher priority than the one currently being serviced, the AVR will immediately jump to the new interrupt vector and start servicing the new interrupt.

The AVR handles this situation by using a mechanism called Interrupt Priority Levels (IPLs). IPLs are used to assign priorities to different interrupt sources. When an interrupt is triggered, the AVR compares its IPL with the current IPL level. If the new interrupt's IPL is higher than the current IPL, the AVR will immediately jump to the new interrupt. If the new interrupt's IPL is lower than or equal to the current IPL, the AVR will continue servicing the current interrupt until it completes.

To avoid conflicts and ensure proper operation, it's important to carefully manage the interrupt priorities and make sure that the most critical interrupt sources have the highest priority. Additionally, interrupt service routines should be designed to be as short and efficient as possible to minimize the risk of new interrupt requests being missed.

Learn more about interrupt vector here: brainly.com/question/12950323

#SPJ4

a network-attached storage device is like a network-connected hard drive. true/false

Answers

True. In essence, a network-attached storage (NAS) device is a specialised computer that is connected to a network and offers storage capacity that other networked devices can access.

Is a network linked hard drive similar to a network attached storage device?

A network drive can be connected via a router, while a NAS can be connected to any device on your network. Network drives function similarly to an external drive attached to your computer even though they lack built-in management software.

Which form of the internet delivers connections that are almost as fast as light?

Broadband connections using fiber-optic technology, also known as fibre internet or just "fibre," have download and upload speeds of up to 940 Megabits per second (Mbps).

To know more about NAS visit:-

https://brainly.com/question/9895531

#SPJ1

What does EID likely refer to?

Answers

An electronic identification ("eID") is a digital method enabling persons or organizations to prove their identity.

Why is it important?

They can be used to examine benefits or services supplied by government agencies, banks, or other businesses, to make mobile payments, and so forth.

Apart from online authentication and login, several electronic identity systems allow users to utilize a digital signature to sign electronic documents.

An electronic identification card (eIC), which is a physical identity card that may be utilized for online and offline personal identification or authentication, is one type of eID.

Learn more about identification:
https://brainly.com/question/28107194
#SPJ1

what is the default subnet mask for the ip address 166.88.1.45? what is the network address? what is the host address?

Answers

The default subnet mask for the IP address 166.88.1.45 is 255.255.255.0. The network address is 166.88.1.0, and the host address is 0.0.0.45.

A subnet mask is a 32-bit number that is used to divide an IP address into multiple subnets. The purpose of a subnet mask is to indicate which bits of an IP address belong to the network address and which bits belong to the host address.

A subnet mask is expressed as four octets, each containing eight bits, just like an IP address. A subnet mask is a binary number that has a contiguous string of ones followed by a contiguous string of zeros. The ones represent the network address, and the zeros represent the host address.

A network address is the portion of an IP address that identifies the network to which the IP address belongs. A network address is obtained by applying a subnet mask to an IP address.

A host address is the portion of an IP address that identifies a particular device on the network. The host address is obtained by taking the IP address and removing the network address (which is obtained by applying the subnet mask to the IP address).

Learn more about  subnet mask:https://brainly.com/question/28256854

#SPJ11

3. what kind of design pattern will you use to implement a system where a set of users will be able to give their feedback on a particular item in an e-commerce application where people can buy items online.

Answers

The Observer design pattern is one that could be applied to the implementation of a system for gathering customer reviews on products in an e-commerce application.

What design pattern would you employ to facilitate changing the way an abstraction is implemented?

By separating an abstraction from its implementation, the bridge design pattern allows for independent change of both. Design patterns are tried-and-true fixes for recurrent issues and growing complexity in software designs.

What design pattern would you employ to make it simple to alter the way a platform-independent feature abstraction is implemented?

In software engineering, a design pattern known as the bridge is used to "decouple an abstraction from its implementation.

To know more about application visit:-

https://brainly.com/question/28206061

#SPJ1

what is the complete path and filename for the database that is used by the locate and mlocate commands?

Answers

The database used by the locate and mlocate programmes has the full path and filename /var/lib/mlocate/mlocate.db.

The locate and mlocate programmes can swiftly search for files using keywords or patterns since this database includes a list of all the files and directories on the system. The database that the commands locate and mlocate utilise is located at /var/lib/mlocate/mlocate.db. The locate command has been changed to use an indexed database for quicker searching using the mlocate command. A cron job usually examines the whole file system each day and updates the database with any new or modified files. Mlocate.db is the name of the database file, which is kept in the /var/lib/mlocate directory.

learn more about database here:

https://brainly.com/question/30634903

#SPJ4

p signed a deed transferring ownership of p's house to q. to provide evidence that p's signature was genuine, p executed a declaration before a notary. this declaration is known as

Answers

"P signed a deed transferring ownership of p's house to q. to provide evidence that p's signature was genuine, p executed a declaration before a notary. This declaration is known as an acknowledgement." Thus, Option B is correct.

P transferred ownership of their house to Q by signing a deed. To ensure that P's signature was authentic, they executed a declaration before a notary, which is called an acknowledgement.

An acknowledgement is a legal statement made by a person before a notary public or other authorized official, confirming the authenticity of their signature on a document. This helps to prevent fraud or dispute over the ownership of the property.

The acknowledgement is a crucial component of the deed, which provides legal proof of the transfer of ownership from P to Q. Option B holds true.

The complete question:

P signed a deed transferring ownership of P’s house to Q. To provide evidence that P’s signature was genuine, P executed a declaration before a notary.

A. AffidavitB. acknowledgmentC. affirmationD. estoppel

Learn more about deed transferring ownership https://brainly.com/question/31072910

#SPJ11

tom is recording an album of songs using a digital audio recording application, and he wants the recordings to be high quality. which advice will best help him to achieve his goal? choose 1 answer: choose 1 answer: (choice a) he should save the audio using a lossless compression algorithm. a he should save the audio using a lossless compression algorithm. (choice b) he should save the audio using a lossy compression algorithm at high quality setting. b he should save the audio using a lossy compression algorithm at high quality setting. (choice c) he should save the file using an open standard. c he should save the file using an open standard. (choice d) he should add metadata to the file with the title, artist, and genre. d he should add metadata to the file with the title, artist, and genre. (choice e) he should save the file on a usb drive, not his internal hard drive. e he should save the file on a usb drive, not his internal hard drive.

Answers

Tom is recording an album of songs using a digital audio recording application, and he wants the recordings to be high quality.

The advice that will best help him to achieve his goal is that he should save the audio using a lossless compression algorithm. What is audio compression? Audio compression is the reduction of audio file size using an algorithm. The audio data's size and bitrate are reduced while keeping the audio quality almost identical to the original audio signal by audio compression.

It is achieved by eliminating the audio file's redundant and irrelevant data, making the audio file smaller without losing audio quality. There are two types of audio compression: lossless audio compression and lossy audio compression. What is Lossless audio compression? Lossless audio compression preserves the quality of the audio file even when it is compressed.

Lossless compression is preferable for audio recordings or music production since the audio quality is not reduced during the process. A lossless audio compression algorithm retains all the audio information, resulting in a file that is almost identical to the original audio signal, with no significant loss of data. The answer is option A.

You can read more about audio compression at https://brainly.com/question/30225170

#SPJ11

Write the necessary preprocessor directive to enable the use of file stream objects.
A. #include
B. include <"f"stream>
C.

Answers

The necessary preprocessor directive to enable the use of file stream objects is: "#include". option A is the correct answer.

#include Preprocessor directive or file inclusion directive is a statement written in the code that tells the preprocessor to include the contents of a file into the source code during the preprocessing stage. In C++, the #include preprocessor directive is used to include a file into the source code, and #define directive is used for creating macro functions or constants. The #include directive can include files with the extensions of the header (.h) or code files (.cpp).

The header files contain function prototypes or declarations and global variables, while the code files contain function implementations.The fstream library in C++ provides file stream classes that can be used to read and write to files on a system. The three stream classes in this library are ifstream, ofstream, and fstream. The ifstream class is used to read from a file, ofstream class is used to write to a file, and fstream class is used to read and write to a file.

"

Complete question

Write the necessary preprocessor directive to enable the use of file stream objects.

A. #include

B. include <"f"stream>

C.  #include <iomanip>

D; #include <conio>

"

You can learn more about preprocessor directive at

https://brainly.com/question/30187204

#SPJ11

which database object is essentially questions that we can ask the database?

Answers

The database object that is essentially questions that we can ask the database is called a query.

 A query is a set of instructions or a question expressed in a structured query language (SQL) that is given to a database in order to retrieve, manipulate, or transform data stored in that database. The process of querying a database is critical in order to extract and manipulate data to support the decision-making process. In essence, a query is a powerful tool for uncovering data insights from a database. A query can be used to search for specific information, perform calculations, combine data from multiple tables, and more.

A query can be created using various SQL commands that are designed to work with different types of databases. Some of the commonly used SQL commands include SELECT, FROM, WHERE, GROUP BY, HAVING, and ORDER BY. These commands are used to specify the columns and tables that are involved in the query, as well as any filtering or sorting requirements that are needed.The results of a query are displayed in the form of a table or a list of records that meet the criteria specified in the query.

For such  more questions on database :

brainly.com/question/28033296

#SPJ11

in pthreads, a parent uses the pthread join() function to wait for its child thread to complete. what is the equivalent function in win32?

Answers

In Win32, the corresponding function to the pthreads function pthread join() function that a parent uses to wait for its child thread to complete is WaitForSingleObject().

In Win32, the corresponding function to the pthreads function pthread_join() function that a parent uses to wait for its child thread to complete is WaitForSingleObject(). Wait for a single object is a basic synchronization function that waits until the specified object is in the signaled state or until the specified time-out interval has elapsed. This function works with the following synchronization objects: event objects, mutex objects, process objects, semaphore objects, and thread objects. Here's how to use WaitForSingleObject() in Win32:DWORD WaitForSingleObject(  HANDLE hHandle, DWORD dwMilliseconds );The WaitForSingleObject() function enables an application to wait until one of the following occurs: a) the specified object is signaled, or b) the time-out interval has elapsed.

Learn more about synchronization function: https://brainly.com/question/4421586

#SPJ11

kjell wants a network scanning tool that gives remediation solutions to found vulnerabilities. he also wants to be able to create customized scan jobs that run during off hours and can scan multiple network technologies. which application is best for him?

Answers

Kjell should use Acunetix Vulnerability Scanner. It provides detailed reports with remediation solutions, customizable scan jobs, and is able to scan multiple network technologies.

Kjell needs a network scanning tool that provides remediation solutions for identified vulnerabilities. Additionally, he needs to be able to create custom scan jobs that can scan multiple network technologies during off hours. Nessus is the best application for Kjell.

Nessus is a vulnerability scanner that is widely used. It can scan for hundreds of security issues in various operating systems, web applications, databases, and other networked services. It generates reports with recommended solutions to identified security concerns, making it an excellent choice for network security vulnerability assessments.

Nessus can be used to create customized scan jobs that can run during off hours, making it ideal for Kjell's purposes. It can be used to scan multiple network technologies, including cloud and mobile, in addition to network protocols like TCP, UDP, and IP. Nessus is the best option for Kjell to fulfill all of his needs in a single application.

You can read more about Vulnerability Scanner at https://brainly.com/question/30225561

#SPJ11

Why should a programmer use a modular design when programming a game, even when a modular design does not change the games output?

Answers

If the software is extremely simple, the modular design would not be the best choice for a game.

What is meant by modular design?Modular design, also known as modularity in design, is a design paradigm that splits a system into smaller components called modules (such as modular process skids), which can be independently generated, changed, swapped with other modules, or between different systems.By dividing the bigger piece of code into smaller units—think modules—each of which holds a distinct function, modular software is created. With improved workload management, better re-usability, and simpler debugging procedures, modular design has been found to enhance the design process.Doing this requires the use of the five modular design components. The design, implementation, testing, deployment, update, and maintenance of each module should be as simple as feasible.

To learn more about modular design, refer to:

https://brainly.com/question/27825941

Explain how two
different types of user interface meet design principles, with some relevant examples.
Pleaseeee!!!

Answers

Some design principles of two types of user interfaces, graphical user interfaces (GUIs) and voice user interfaces (VUIs), are:

GUIs: consistency, visibility , and feedbackVUIs: clarity and contextual awarenes

How two different types of user interface meet design principles?

User interface (UI) design principles are general guidelines that help designers create interfaces that are usable, efficient, and aesthetically pleasing. There are many different types of user interfaces, each with their own set of design principles.  here, I will explain how two different types of user interface - graphical user interfaces (GUIs) and voice user interfaces (VUIs) - meet design principles.

Graphical User Interfaces (GUIs)

GUIs are a type of user interface that use visual elements such as buttons, icons, and menus to allow users to interact with software applications. Some design principles that GUIs should adhere to include are consistency (to avoid confussion), visibility (all should be clearly visible), and feedback (so the user can know that their actions are being done).

Voice User Interfaces (VUIs)

VUIs are a type of user interface that use voice recognition technology to allow users to interact with software applications using spoken commands. Some design principles that VUIs should adhere to include clarity (so the user can uderstand) and contextual awarenes (so the interface analyzes the whole conversation before making an answer).

Learn more about user interfaces at:

https://brainly.com/question/17372400

#SPJ1

2.Consider the following method. What is the result of mystery(3)?
public static int mystery(int n)
{
if (n < 5)
{
return mystery(n + 1) − 2;
}
return n − 1;
}
A)0
B)1
C)3
D)4
E)5
3.Consider the following method. What is the value of mystery(1)?
public static void mystery(int n)
{
if(n > 5)
{
System.out.print(n + " ");
}
else
{
mystery(n + 3);
}
}
A)1
B)4
C)7
D)7 4 1
E)1 4 7
4. Consider the following method. What is the value of recur("COMPUTER")?
public static void recur(String str)
{
int len = str.length();
if(len > 1)
{
String temp = str.substring(0, len − 2);
recur(temp);
System.out.println(temp);
}
}
A)CO
B)COMPUT
C)C
COM
COMPU
D)CO
COMP
COMPUT
E)COMPUT
COMP
CO

Answers

For the first question, we can trace the method calls:
mystery(3) returns mystery(4) - 2
mystery(4) returns mystery(5) - 2
mystery(5) returns 4 - 1
Therefore, mystery(3) returns 3 - 2 = 1.
So the answer is B) 1.

For the second question, we can also trace the method calls:
mystery(1) calls mystery(4)
mystery(4) calls mystery(7)
mystery(7) prints 7 and returns to mystery(4)
mystery(4) returns to mystery(1)
Therefore, mystery(1) prints 4 and does not return a value.
So the answer is B) 4.

For the third question, we can also trace the method calls:
recur("COMPUTER") calls recur("COMPUTE")
recur("COMPUTE") calls recur("COM")
recur("COM") calls recur("")
recur("") returns immediately
recur("COM") prints "CO"
recur("COMPUTE") prints "COMPU"
recur("COMPUTER") prints "COMPUT"
Therefore, recur("COMPUTER") prints "CO", "COMPU", "COMPUT".
So the answer is D) CO COMP COMPUT.

To know more about method calls:

https://brainly.com/question/14006780

#SPJ11

which of the following certifies when an os meets unix requirements? ieee unix users group the open group suse group

Answers

The organization that certifies when an operating system meets Unix requirements is The Open Group.

UNIX is an operating system that was developed in the late 1960s by Bell Labs as a multiuser, multitasking operating system. It was one of the first operating systems created by developers. UNIX is an operating system designed for the sole purpose of making it easier to use, and it provides a command-line interface that can be used to perform operations.

The Open Group is an organization that certifies that an operating system meets the requirements of the UNIX 03 specifications. In addition, the Open Group maintains and publishes the Single UNIX Specification. This specification is designed to ensure that operating systems that follow it are compliant with the UNIX standard.

To gain compliance certification, an operating system must go through a rigorous testing process, which includes verification that it meets the standard's requirements, and it is compatible with other UNIX systems.

You can learn more about UNIX at: brainly.com/question/2274690

#SPJ11

what is the primary use case for using web application firewall in oracle cloud infrastructure (oci)?

Answers

Malicious queries to your web application or API are blocked by the Oracle Cloud Infrastructure WAF. Additionally, it improves your ability to see where the traffic is originating from and mitigates Layer 7 DDoS attacks for higher availability.

What is meant by oracle cloud infrastructure?Oracle Cloud Infrastructure (OCI) is a platform of cloud services that enables you to create and run a variety of applications in a consistently high-performance setting.OCI was created with a zero-trust, security-first architecture. OCI, in contrast to Amazon, gives you simple-to-implement security controls and automation to avoid configuration mistakes and apply security best practices.This solution's cloud architecture provides the greatest support for trustworthy storage, AI-driven analytics, and other services. Vendavo, eVergeGroup, Info and city, and Link Solutions, among other businesses, use Oracle cloud services.OIC is built on top of OCI. Whereas OCI, which stands for Oracle Cloud Infrastructure, is an IaaS and PaaS service from Oracle that combines Serverless computing, integrated security, and autonomous services to provide real-time elasticity for business applications.

To learn more about oracle cloud infrastructure, refer to:

https://brainly.com/question/15962730

optical discs can be written to, erased, and overwritten just like magnetic hard disks. a. rewritable b. erasable c. rereadable d. recordable

Answers

.Optical discs can be written to, erased, and overwritten just like magnetic hard disks. These are known as rewritable discs. Therefore, the correct answer to the given question is a. rewritable.

What are optical disks: Optical disks are a type of disk that uses laser technology to read and write data. CD-ROMs, DVDs, and Blu-ray discs are all examples of optical discs. Generally, A computer disk that reads and writes data using methods and technologies associated with optical storage is referred to as an optical disk. Unlike magnetic disks, which use spinning platters to read and write data, optical disks are read using a laser beam that reads information from the disk's reflective surface.

Learn More About Optical Disks: https://brainly.com/question/28066311

#SPJ11

with respect to the types of information systems used in organizations, a grocery store checkout cash register with a connection to a network is an example of a(n) . (chapter 1)

Answers

A grocery store checkout cashier with a network connection is an example of a transaction processing system in terms of the different information systems utilized in companies.

What is a transaction processing system?The data transactions of an enterprise are collected, stored, modified, and retrieved by a transaction processing system (TPS), a type of information system. Although less crucial than real-time systems, transaction processing systems also make an effort to offer predictable response times to queries.Transaction processing systems are made up of computer hardware and software that run a transaction-oriented application that executes the standard transactions required for corporate operations. Systems that control sales order input, travel arrangements, payroll, personnel files, manufacturing, and shipping are a few examples. Custom business applications can employ transaction processing systems' functions to access data, conduct intercomputer connections, and develop and manage user interfaces.

To learn more about transaction processing system, refer to:

https://brainly.com/question/4394218

in a class containing methods with the same name, the methods are distinguished by: group of answer choices return type both types of arguments and return type are correct types of arguments both number and types of arguments are correct number of arguments

Answers

In a class containing methods with the same name, the methods are distinguished by the number and types of arguments they take. This is also known as method overloading. To differentiate methods with the same name, Java uses method overloading or overriding.

The method that is called depends on the number and types of arguments supplied by the caller. For example, if two methods have the same name but different types of arguments, the method that is called depends on the type of arguments supplied. Similarly, if two methods have the same name and same types of arguments, the method that is called depends on the number of arguments supplied.

Java methods, in particular, are used to express the behaviors of objects, allowing them to interact with one another. The methods are distinguished by both types of arguments and return type in a class containing methods with the same name.

Learn more about class and method in Java https://brainly.com/question/28564198

#SPJ11

question 10 which of these are essential characteristics of the cloud? select two. 1 point resource pooling single-tenant fixed fee on-demand self-service

Answers

Essential characteristics of the cloud are: self-service and resource pooling. These are the two features that make cloud computing so popular among businesses and enterprises.

What is the cloud?

Cloud refers to a cluster of networked computers or servers that enable the collection, processing, storage, and retrieval of data. The cloud is a collection of networked computers, servers, and storage devices that are accessed over the internet to provide computing resources.

What are the essential characteristics of the cloud?

Cloud computing is becoming increasingly popular among businesses due to the following features:

Self-service: Self-service is an essential characteristic of the cloud. It enables businesses to instantly acquire computing resources without having to go through a manual approval process. Users can self-provision resources and begin using them immediately.Resource pooling: Resource pooling is another important feature of the cloud. It enables several users to share a common pool of computing resources such as servers, storage, and networks. This improves efficiency and lowers costs.

Fixed fee, on-demand, and single-tenant are not essential characteristics of the cloud. Therefore, the correct answer is self-service and resource pooling.

Learn more about Cloud: https://brainly.com/question/19057393

#SPJ11

The two essential characteristics of the cloud are Resource pooling and On-demand self-service.

Resource Pooling refers to the ability of a cloud computing system to allocate resources dynamically as needed. On-demand self-service means that users can get the resources they need whenever they want them without having to go through a central IT department or request a formal requisition.

The other options that are mentioned in the question are not the essential characteristics of the cloud. Single-tenant: A single-tenant system is a type of software application that is designed to run on a single server or machine. This is not an essential characteristic of cloud computing. Fixed fee: Fixed fee is not an essential characteristic of cloud computing. The cost of cloud computing services can vary depending on the provider and the level of service.

On-demand: On-demand is an essential characteristic of the cloud, but it has already been mentioned earlier in the answer.

Learn more about  Resource pooling and On-demand self-service:https://brainly.com/question/17160061

#SPJ11

a software engineer for a university is creating a system to keep track of students. they need to decide which data should be considered pii so that they can store it in a more secure database. which of the following pieces of data is most likely to be considered pii? choose 1 answer: choose 1 answer: (choice a) declared major a declared major (choice b) home address b home address (choice c) gpa (grade point average) c gpa (grade point average) (choice d) grade level d grade level

Answers

The following pieces of data is most likely to be considered PII: Home address. Choice B is the correct answer.

PII is the abbreviation for Personally Identifiable Information. It is a term used in data protection laws to describe any data that might help identify an individual.Because it might allow someone to locate you, your home address is considered PII. Your declared major, grade level, and grade point average are not as closely related to your individual identity as your home address. As a result, home address (option B) is most likely to be regarded PII.

You can learn more about database at

https://brainly.com/question/518894

#SPJ11

programs are software programs that are distributed on the honor system. a. commercial b. freeware c. shareware d. public domain

Answers

"Shareware programs are software programs that are distributed on the honor system." Thus, Option C is correct.

Shareware programs are software applications that are typically distributed for free with the expectation that users will pay a fee if they find the software useful. The distribution of shareware programs is typically based on the honor system, meaning that users are not required to pay anything upfront but are instead asked to voluntarily make a payment if they continue to use the software.

Shareware programs are often used as a marketing tool by software developers to get their product in the hands of potential customers. The success of shareware programs is often dependent on the goodwill of users and their willingness to pay for the software they find useful. Option C is correct.

This question should be provided as:

____ programs are software programs that are distributed on the honor system.

a. Commercial b. Freeware c. Sharewared. Public domain

Learn more about Shareware programs https://brainly.com/question/30175842

#SPJ11

Other Questions
THE COLD WAR HEATS UP 2. How did Korea become a divided nation after World War II? Read the excerpt from "Mother Tongue."And sure enough, the following week there we were in front of this astonished stockbroker, and I was sitting there red-faced and quiet, and my mother, the real Mrs. Tan, was shouting at his boss in her impeccable broken English.What can be inferred from the excerpt?Nonstandard forms of English can be as effective as the standard form of English.Nonstandard forms of English limit a speakers ability to stand up for herself.Nonstandard forms of English make communication difficult between cultures.Nonstandard forms of English are used more by older adults than by younger adults. you start at (6,10) and move 6 units right and 4 units down where are you now PLS, PLS, PLS HELP!!!!!!! What are some little things that make you happy? In what ratio does the line of the equation 4x + 5y = 21 divide the line segment joining the points (-2, 3) and (4, 5) ? if the market price facing this price-taker firm was p4, to maximize profit the firm will produce output of a. q1 and earn positive economic profits in the short run. b. q1 and suffer short-run economic losses. c. q4 and earn positive economic profits in the short run. d. q4 and suffer short-run economic losses. Which of the following is a community of plants and animals which occupies a large geographical area within a particular climate zone? BiomeNicheHabituate 1. What are the differences and similarities between a local area network (LAN) and a wide areanetwork (WAN)?2. As the different network types have evolved, careers in the Network Systems pathway havechanged over time. Discuss an example of how network system careers have changed and howthose changes have impacted society.3. What is an Internet Service Provider? Describe at least two types of ISP connections.4. Explain two ways that you can stay safe while working in the Network Systems career pathway.5. There are many different careers available within the Network Systems career pathway, but they allhave some similar characteristics. What are two of these characteristics? Of the following options, which would be the best way for a college student to increase his or her intake of folate? A. Consume a spinach salad topped with strawberries and slivered almonds for lunch. B. Choose an animal source of protein rather than a plant source of protein at dinner. C. Choose skim milk instead of calcium-fortified orange juice as a beverage at breakfast. D. To prepare a sandwich, choose whole grain bread instead of bread made from enriched wheat flour. A wire reaches from the top of a 26-meter telephone pole to a point on the ground 8 meters from the base of the pole. What is the length of the wire to the nearest tenth of a meter? Reread the following passage from pages 91-92: He had passed visibly through two states and was entering upon a third. After his embarrassment and his unreasoning joy he was consumed with wonder at her presence. He has been full of the idea so long, dreamed it right through to the end, waited with his teeth set, so to speak, at an inconceivable pitch of intensity. Now, in reaction, he was running down like an overwound clock. What does this suggest for Gatsbys future? A. He will be happy with Daisy. B. He will be miserable with Daisy. C. He will be lost without his ambition. D. He will be more ambitious than ever. a water-soluble micronutrient found exclusively in animal sources is essential for erythropoiesis. what can result from deficiency of this compound? Which of the following are benefits of having a checking account? How to report someone abusing unemployment anonymously in Illinois? Consider the following method. public static void strChange(String str){ if (str.length() > 0) { strChange(str.substring(1)); System.out.print(str.substring(0, 1)): } Which of the following best describes the behavior of the method? Ait prints the first character of str. B It prints the characters of str in the order they appear. It prints the characters of or in reverse order D It prints the last character of str. E It prints nothing due to infinite recursion felix wants to save an additional $250,000 for his retirement in 10 years. he has accumulated $74,000 so far, and he wants to use 5% as his annual rate of return. how much would felix need to deposit at the end of each year in order to reach his goal of accumulating a total of $250,000? Choose one human-resources career described and decide on an appropriate major, for a student wishing to pursue this career.Use online resources to identify a college or university that offers a bachelor's degree in your chosen major.Use the school's Web site to create a four-year undergraduate course curriculum that fulfills the school's graduation requirements.Write a 400-word essay that describes the human-resources skills and knowledge a student will possess following the successful completion of your course. NEED IT NOW PLEASE HELP !! which of the following statements is correct? a. the binomial distribution is a continuous probability distribution, and the normal distribution is a discrete probability distribution. b. the binomial and normal distributions are both discrete probability distributions. c. the binomial and normal distributions are both continuous probability distributions. d. the binomial distribution is a discrete probability distribution and the normal distribution is a continuous probability distribution. Find the length of the missing side. Provide an answer accurate to the nearest tenth