in which cloud computing category do customers rent hardware, including servers, storage, networking

Answers

Answer 1

IaaS (Infrastructure as a service) is on-demand access to cloud-hosted computing infrastructure - servers, storage capacity and networking resources.

IaaS (Infrastructure as a service)

In 2008, Amazon emerged as the first significant provider of infrastructure as a service (IaaS). A cloud services provider provides computing resources through the IaaS model of cloud computing. Storage, networks, servers, and virtualization are provided by the IaaS vendor (which mostly refers, in this case, to emulating computer hardware). Users are freed from having to operate an on-site data center thanks to this service. The IaaS provider is hosting these resources in a hybrid cloud, a private cloud, or a public cloud, which means that customers share the same hardware, storage, and networking devices with other users (combination of both).

It offers the client high-level APIs that are used to dereference different low-level components of the network architecture, including as physical computing resources, scaling, security, and data partitioning. The virtual machines are run as guests by a hypervisor, such as Xen, Oracle VirtualBox, Oracle VM, KVM, VMware ESX/ESXi, or Hyper-V. Large numbers of virtual machines can be supported by pools of hypervisors within the cloud operating system, and services can be scaled up and down in response to changing client needs.

To know more about IaaS (Infrastructure as a service, Check out:

https://brainly.com/question/23864885

#SPJ4


Related Questions

What are cascading style sheet?

Answers

Cascading Style Sheets is a style sheet language used for describing the presentation of a document written in a markup language such as HTML. CSS is a cornerstone technology of the World Wide Web, alongside HTML and JavaScript.

Answer:

It is used to describe the presentation of a document written up in a markup language such as HTML....

Explanation: Hope this helps<3

what report indicates where users start or exit the conversion funnel?

Answers

The Goal Flow report indicates where users start or exit the conversion funnel.

What is a report on a funnel visualisation?Any skipped stages between the user's entry point into the funnel and their exit point are filled in by the Funnel Visualization report. A user navigates from step 2 to goal, skipping steps 1 and 3, for instance, if your funnel is designed as step 1 > step 2 > step 3 > goal.The Goal Flow report depicts the route your traffic took through a conversion funnel to reach a goal. This analysis may show you whether people are interacting with your material as you would expect them to or whether there are issues, including high drop-off rates or unexpected loops.

To learn more about funnel refer to:

https://brainly.com/question/29921469

#SPJ4


Critically review the different types of ERP software, along
with their strengths and weaknesses, such as Off-the-shelf,
In-house, and Open-Source ERPs

Answers

There are different types of ERP software available, including off-the-shelf, in-house, and open-source ERPs. Each type has its strengths and weaknesses. Off-the-shelf ERPs offer pre-built solutions with extensive functionalities but may lack customization options. In-house ERPs provide tailored solutions to meet specific business requirements but can be costly and time-consuming to develop.

Open-source ERPs offer flexibility and cost-effectiveness, allowing customization and collaboration but may require technical expertise for implementation and ongoing maintenance. Off-the-shelf ERPs, such as SAP and Oracle, are popular due to their comprehensive features and wide industry acceptance. They provide a ready-made solution that can be quickly implemented, reducing development time and costs. However, they may lack customization options and may require businesses to adapt their processes to fit the software's functionality.

In-house ERPs are built from scratch, allowing organizations to tailor the system to their specific needs. This provides maximum control and customization possibilities, ensuring a perfect fit for the business. However, in-house ERPs can be expensive and time-consuming to develop, requiring significant resources and technical expertise. Additionally, ongoing maintenance and updates can be challenging.

Open-source ERPs, like Odoo and ERPNext, offer flexibility and cost-effectiveness. They provide access to the source code, allowing customization and collaboration within the developer community. Open-source ERPs can be more affordable and adaptable to changing business requirements. However, implementation and maintenance require technical expertise, and support may rely on community forums.

Ultimately, the choice of ERP software depends on the organization's specific needs, budget, resources, and technical capabilities. It is important to carefully evaluate the strengths and weaknesses of each type before selecting the most suitable option.

Learn more about resources here: https://brainly.com/question/30799012

#SPJ11

2.2 Lesson Practice python quiz

Answers

Answer:x = int(input("Enter an integer: "))

print(x + 1)

print(x + 2)

print(x + 3)

2.2 question 2

a = float(input("Enter number here: "))

b = float(input("Enter number here: "))

c = float(input("Enter number here: "))

print(a + b + c)

Explanation:

1)write a python program to check wheter the given number is even or odd
2) write a python program to add any 5 subjects makrs, find sum and average (average=sum/5)
3)write a python program to print numbers from 1 to 100 using loops

Answers

Answer:

n = 16

if n%2:

 print('{} is odd'.format(n))

else:

 print('{} is even'.format(n))

m1 = 5

m2 = 4

m3 = 6

m4 = 8

m5 = 9

sum = m1+m2+m3+m4+m5

average = sum/5

print("The sum is {}, the average is {}". format(sum, average))

for i in range(1, 101): print(i, end=",")

Explanation:

Above program does all three tasks.

Answer:

1) num1 = int(input("Enter the number to be checked: "))

if num1%2==0:

   print("Your number is an even number!")

else:

   print("Your number is not even!")

2) maths = int(input("Enter your maths mark: "))

english = int(input("Enter your english mark: "))

social = int(input("Enter your social mark: "))

science = int(input("Enter your science mark: "))

computer = int(input("Enter your computer mark: "))

Sum =  maths + english + social + science + computer

average = Sum / 5

print("Sum of your marks are:",Sum)

print("average of your marks are:",average)

3) num = 0

while num <= 99:

   num+=1

   print(num)

Explanation:

Welcome.

Point out unsymmetrical places between AES encryption and AES
decryption.

Answers

AES (Advanced Encryption Standard) is a symmetric encryption algorithm, which means that the same key is used for both encryption and decryption.

The AES encryption and decryption processes are largely similar, but there are a few unsymmetrical aspects between them.

Key Expansion: AES encryption requires key expansion, where the original encryption key is used to generate a set of round keys. This key expansion process is not required during AES decryption, as the round keys are used in the reverse order.

Initial Round Key Addition: In the first round of AES encryption, the plaintext is combined with the initial round key using bitwise XOR operation. However, in AES decryption, the ciphertext is combined with the final round key.

Round Keys Order: During AES encryption, the round keys are used in a forward manner, starting from the initial round key and progressing to the final round key. In AES decryption, the round keys are used in the reverse order, starting from the final round key and progressing back to the initial round key.

SubBytes and InvSubBytes Operations: AES encryption uses the SubBytes operation, which substitutes each byte of the state matrix with a corresponding byte from the S-Box. In AES decryption, the InvSubBytes operation is used, which performs the inverse substitution using the inverse S-Box.

Learn more about AES (Advanced Encryption Standard) here:

https://brainly.com/question/31925688

#SPJ11

If you can tell me what Ella Mai's last name is I'll mark you brainliest.

Answers

Ding Dong

I know you can hear me

Open up the door

I only want to play a little

Ding Dong

You can't keep me waiting

It's already too late

For you to try and run away

I see you through the window

Our eyes are locked together

I can sense your horror

Though I'd like to see it closer

Ding Dong

Here I come to find you

Hurry up and run

Let's play a little game and have fun

Ding Dong

Where is it you've gone to?

Do you think you've won?

Our game of hide and seek has just begun

I hear your footsteps

Thumping loudly through the hallways

I can hear your sharp breaths

You're not very good at hiding

Just wait, you can't hide from me

(I'm coming)

Just wait, you can't hide from me

(I'm coming)

Just wait, you can't hide from me

(I'm coming)

Just wait, you can't hide from me

Knock Knock

I am at your door now

I am coming in

No need for me to ask permission

Knock Knock

I'm inside your room, now

Where is it you've hid?

Our game of hide and seek's about to end

I'm coming closer

Looking underneath your bed but

You're not there, I wonder

Could you be inside the closet?

Ding Dong

I have found you

Ding Dong

You were hiding here

Now you're it

Ding Dong

Finally found you, dear

Now you're it

Ding Dong

Looks like I have won

Now you're it

Ding Dong

Pay the consequence

Ding Dong

Looks like I have won

Now you're it

Ding Dong

Pay the consequence

Answer:

her last name is Howell so her full name is Ella Mai Howell lol

Explanation:

If you're under 18 and you receive _____ or more license points in 12 months, you'll be restricted to driving only to school or work for one year.

Answers

Answer:

B:6

Explanation:

FLVS :)

Answer: 6 is the correct answer

What type of lines are never shown on an apa formatted table?.

Answers

In APA (American Psychological Association) formatting, there are specific guidelines for creating tables.

One important rule is that vertical lines are not used in APA-formatted tables. This means that tables in APA style do not have vertical lines separating columns of data.

The rationale behind this guideline is to maintain a clean and uncluttered appearance, making the table easier to read and interpret. APA style emphasizes simplicity and clarity in presenting information, and the absence of vertical lines helps achieve this goal.

Instead, horizontal lines are used sparingly, mainly to separate the table's title and headings from the data, as well as to indicate the end of the table.

By omitting vertical lines, APA-formatted tables promote a more organized and professional look while enhancing the focus on the data itself. Researchers and authors following APA guidelines should adhere to this rule when creating tables to ensure consistency and conformity to the APA style standards.

For more questions on APA, click on:

https://brainly.com/question/18461731

#SPJ8

Nelson’s Hardware Store stocks a 19.2-volt cordless drill that is a popular seller. The annual demand is 5,000 units, the ordering cost is $15, and the inventory holding cost is $4/unit/year
What is the economic order quantity?
What is the total annual cost for this inventory item?

Answers

The total annual cost for Nelson's Hardware Store's cordless drill inventory item is approximately $774.60.

To determine the economic order quantity (EOQ) and total annual cost for Nelson's Hardware Store's cordless drill inventory item, we need to consider the annual demand, ordering cost, and inventory holding cost. The EOQ represents the optimal order quantity that minimizes the total cost of inventory management. The total annual cost includes both ordering costs and inventory holding costs.

The economic order quantity (EOQ) can be calculated using the formula:

EOQ = sqrt((2 * Annual Demand * Ordering Cost) / Holding Cost per Unit)

Given:

Annual demand = 5,000 units

Ordering cost = $15

Inventory holding cost = $4/unit/year

Using the given values, we can calculate the EOQ:

EOQ = sqrt((2 * 5,000 * 15) / 4) = sqrt(37,500) ≈ 193.65

Therefore, the economic order quantity for the cordless drill is approximately 194 units.

To calculate the total annual cost, we need to consider both the ordering cost and the inventory holding cost. The total annual cost can be calculated using the formula:

Total Annual Cost = (Ordering Cost * Annual Demand / EOQ) + (Holding Cost per Unit * EOQ / 2)

Substituting the given values into the formula:

Total Annual Cost = (15 * 5,000 / 194) + (4 * 194 / 2) ≈ 386.60 + 388 ≈ $774.60

Therefore, the total annual cost for Nelson's Hardware Store's cordless drill inventory item is approximately $774.60.


To learn more about inventory click here: brainly.com/question/31552490

#SPJ11

Tanisha has 51 m of fencing to build a three-sided fence around a rectangular plot of land that sits on a riverbank. (the fourth side of the enclosure would be the river. ) the area of the land is 304 square meters. List each set of possible dimensions (length and width) of the field.

Answers

Possible dimensions of the field are 12.75 and 23.84 m

 

How to rectangular?

An example of a parallelogram with equal and corresponding separate sides is rectangular. It is a polygon with four sides and four angles that are each 90 degrees. A rectangle is a form with only two dimensions.

Thus, the third side = (51 – 2x) \(m^{2}\)

Area (A) is given by;

A = (51 – 2x)x

A = 51x - 2x²

Differentiate with respect to x to get;

dA/dX = 51 - 4x

For a maximum Area, differentiate and equate to zero i.e. dA/dx = 0. Thus;

51 – 4x = 0

x = 51/4

x = 12.75 m

The area is 304 m². Thus, the other possible dimension is;

w = 304/12.75

w = 23.84 m

Learn more about rectangular, here:

https://brainly.com/question/21416050

#SPJ1

amal has a crypto wallet that contains several tokens in addition to the ether hew owns Which of following is true about her tokens? A. they are native to ethercom blockchain B. they were mined either by amal of another user C. they can be traded bought or sold and they may hold value D. they cannot hold value on there own

Answers

The tokens owned by Amal can be traded, bought, or sold, potentially holding value, but they cannot independently retain value. Therefore, option C and D are correct.

In the context of tokens, retaining value means that the tokens have the potential to maintain or increase their worth over time. This value retention is influenced by various factors such as market demand, utility, scarcity, and investor sentiment.

Tokens that are widely traded and perceived as valuable can experience price appreciation, while those with limited use cases or lack of market demand may struggle to retain value.

The ability to retain value is important for investors and users of tokens as it impacts their potential returns and overall investment viability.

Learn more about viability here:

https://brainly.com/question/1569734

#SPJ4

You work for a company that offers their services through the Internet. Therefore, it is critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. After doing a little research, you have determined that you are a victim of a denial-of-service attack.
As a first responder, which of the following is the next BEST step to perform?
A. Prevent such an incident from occurring again.
B. Investigate how the attack occurred.
C. Contain the problem.
D. Hire a forensic team to gather evidence.

Answers

Answer:

First you need to investigate how the attack occurred, because if you don't know the root cause how are you going to prevent it from happening again.

Hope this help please give the brainliest award.

the iatf defined 4 steps for access control: - identification and authentication (i&a); authorization; decision; enforcement. what is meant by each of these?

Answers

The access control steps include identification and authentication (I&A) to verify user identity, authorization to determine allowed actions and enforcement to ensure compliance with access control decisions. These steps help protect systems and resources by ensuring authorized access and preventing unauthorized usage or breaches.

An explanation of the commonly recognized access control steps: identification and authentication (I&A), authorization, decision, and enforcement are as follows:

1. Identification and Authentication (I&A): This step involves identifying individuals or entities seeking access to a system or resource and verifying their claimed identity. Identification establishes a unique identity for each user or entity, usually through the use of usernames, email addresses, or other identifiers.

Authentication verifies the claimed identity by requiring the user to provide credentials, such as passwords, biometric data, or security tokens. The goal is to ensure that only authorized users gain access to the system.

2. Authorization: Once a user's identity is verified, authorization determines what actions or resources the user is permitted to access. It involves granting or denying permissions based on predefined rules and policies. Authorization can be based on various factors such as user roles, group membership, or specific attributes associated with the user.

3. Decision: The decision step evaluates the authorization request against the established access control policies and rules. It determines whether the requested access should be allowed or denied based on factors such as the user's identity, the requested resource, time of access, and other contextual information.

The decision-making process considers the user's authorization level and the security policies in place.

4. Enforcement: After the decision is made, the access control enforcement step ensures that authorized actions are carried out and that any unauthorized actions are prevented. This involves implementing mechanisms and safeguards to enforce the access control decisions, such as applying encryption, firewall rules, or physical barriers.

Enforcement mechanisms can be implemented at various levels, including the application level, operating system level, or network infrastructure level.

These access control steps collectively help organizations protect their systems, data, and resources by ensuring that only authorized individuals or entities gain access while preventing unauthorized access or misuse of resources.

Learn more about authentication:

https://brainly.com/question/13615355

#SPJ11

Which of the following does counter controlled repetition not require?
(a) an initial value
(b) a condition that tests for the final value
(c) an increment or decrement by which the control variable is modified each time through the loop
(d) counter controlled repetition requires all of the above

Answers

The correct answer is (d) counter controlled repetition requires all of the above.

Counter controlled repetition, also known as "for loop" or "loop with a control variable," typically requires the following components:

(a) An initial value: This is the starting value of the control variable, which is set before the loop begins.

(b) A condition that tests for the final value: This condition determines when the loop should terminate. It compares the control variable to a certain value or uses a logical expression to evaluate whether the loop should continue or not.

(c) An increment or decrement: This specifies how the control variable should be modified on each iteration of the loop. It can be an increment (e.g., increasing the control variable by 1) or a decrement (e.g., decreasing the control variable by 1).

All of these components are essential for counter controlled repetition to function correctly. Therefore, option (d) states the correct answer.

Learn more about controlled repetition here:

https://brainly.com/question/32178497

#SPJ11

What is the name of the protocol suite used on the internet.

Answers

Answer:

standard Internet Protocol (IP) suite

Explanation:

Introduction. The Internet is a global system of interconnected computer networks that use the standard Internet Protocol (IP) suite to serve billions of users all over the world.

a(n) ____________________ is a memory location whose contents can be changed.

Answers

A variable is a memory location whose contents can be changed. In computer programming, variables are used to store and manipulate data during the execution of a program. They act as containers that hold different types of values, such as numbers, text, or objects.

Variables are essential for dynamic and flexible programming as they allow the program to store and modify data as needed. They have names or identifiers that are used to refer to them and can be assigned initial values or updated throughout the program's execution.

The contents of a variable can be changed by assigning new values to it using assignment statements or through various operations and computations performed in the program. This ability to store and modify data dynamically makes variables a fundamental concept in programming languages.

To learn more about Programming - brainly.com/question/14368396

#SPJ11

when in a data set on the edit panel, what is entered in the prefix area to add three more lines to enter data?

Answers

The prefix area is used to add additional rows or columns to the data set. To add three more lines to enter data, you would enter "3" in the prefix area. This will add three new lines of data to the bottom of the data set.

What is data set?

A data set is a collection of related data items organized in a specific format. It typically includes a variety of values, variables, or observations that are collected, stored, and analyzed together. Data sets are often used to study a particular phenomenon, policy, or behavior and can be used to answer questions and test hypotheses. They are commonly used in research, business, and government settings and are often used to inform decisions and policy-making. Data sets can range from simple to complex and often include multiple variables that have been collected from multiple sources.

To learn more about data set
https://brainly.com/question/24251046

#SPJ1

What important information is examined in the ethernet frame header by a layer 2 device in order to forward the data onward?.

Answers

An  important information that is examined in the ethernet frame header by a layer 2 device in order to forward the data onward is  option C: destination MAC address.

Is MAC address source or destination?

The use of the addresses in the Datalink layer header, a Layer 2 switch locates the destination device in a Local Area Network (LAN) (where the data needs to be sent). The addresses put at the Datalink layer header are MAC addresses, as can be seen from the Datalink layer Frame structure.

The Layer 2 device, such as a switch, utilizes the destination MAC address to decide which port or interface to use to send the data on to the final destination.

The MAC ID of the device that transmitted the packet serves as the source, and the MAC ID of the device that is supposed to receive it serves as the destination.

Learn more about destination MAC address from

https://brainly.com/question/27911999
#SPJ1

What important information is examined in the Ethernet frame header by a Layer 2 device in order to forward the data onward?

source MAC address

source IP address

destination MAC address

Ethernet type

destination IP address

smart tv has _____ intergrated with it

Answers

Answer:

an operating system

Explanation:

rajiv is responsible for setting up a new database instance on a server. which would be the preferred type of account he should use to create this database server?group accountservice accountdomain admin account rajiv should use his existing credentials

Answers

When setting up a new database instance on a server, it is generally recommended to use a service account specifically created for database administration tasks. Using a dedicated service account offers better security and control over the database environment.

Rajiv should not use his existing credentials for creating the database server, as it is preferable to separate administrative tasks and responsibilities. Using a separate service account allows for more granular access control, easier auditing, and helps minimize potential risks associated with using personal accounts. Group accounts and domain admin accounts are typically used for managing user access and permissions at a broader level within a domain or organizational unit, rather than for specific database administration tasks. Therefore, the preferred type of account for Rajiv to create the database server would be a dedicated service account with the necessary privileges to perform database administration tasks.

Learn more about database here : brainly.com/question/30163202
#SPJ11

If you have an on-premise system and you use AWS Cloud to mirror data or replicate data from your on-premise system, which architectural pattern are you using?
Select one:
a.
Fully Working Low-Capacity Standby
b.
Pilot Light
c.
Multi-Site Active-Active
d.
Backup and Restore

Answers

The architectural pattern that corresponds to using AWS Cloud to mirror or replicate data from an on-premise system is the Multi-Site Active-Active pattern. By using the Multi-Site Active-Active pattern, organizations can achieve increased scalability, resilience, and disaster recovery capabilities.

In the Multi-Site Active-Active pattern, both the on-premise system and the AWS Cloud infrastructure are active and operational simultaneously. The on-premise system serves as one site, while the AWS Cloud serves as another site. Data is replicated or mirrored between these two sites, ensuring that both systems are synchronized and up-to-date.

This pattern allows for high availability and fault tolerance. In case of a failure or disruption in one site, the other site can seamlessly take over and continue serving the workload. The data replication ensures that the systems stay synchronized, minimizing any potential data loss.

It allows them to leverage the flexibility and scalability of the AWS Cloud while maintaining the on-premise system for certain specific requirements or to distribute the workload across multiple locations.

Learn more about data here:

https://brainly.com/question/21927058

#SPJ11

10. Two technicians are discussing recycling specifications for refrigerant. Technician A says that refrigerant oil with 5,000 parts per million (ppm) does not fall
within specifications. Technician B says that air can only have a maximum of 330 ppm. Who is correct?
O A. Neither Technicians A and B
OB. Technician B
O C. Both Technicians A and B
O D. Technician A

Answers

Two technicians are discussing recycling specifications for refrigerant   Technician A is correct.

What is the recycling ?

Recycling is the process of transforming waste materials into new products to prevent the waste of potentially useful materials and reduce the consumption of fresh raw materials. It is an important part of the global economy and helps to preserve the environment by reducing energy usage, air and water pollution, and reducing the amount of waste sent to landfills. Recycling can be done through mechanical means such as shredding or separation, or through chemical processes such as melting and reforming.

To learn more about recycling

https://brainly.com/question/27248056

#SPJ1

Benefits of donating computer equipment include Select all that apply. A. extending the useful ife of the device B. heiping someone who can't afford a new deviceC. keeping e-waste out of landfills D. avoiding having the device waste space in your homeloflice

Answers

Benefits of donating computer equipment include:

B. helping someone who can't afford a new deviceC. keeping e-waste out of landfills D. avoiding having the device waste space in your home office

What is a Donation?

This refers to the term that is used to define the act of giving a thing out to someone else who usually needs it more as a form of helping them or emancipation.

Hence, it can be seen that when it comes to computer equipments, donations can be made and this helps the person to prevent e-waste and also help someone else.

Read more about donations here:

https://brainly.com/question/13933075

#SPJ1

which of the choices listed indicates that the os is in secure desktop modea. CTRL+ALT_DELETEb. UACc. Windows login screen

Answers

The choice that indicates that the OS is in secure desktop mode is B - UAC.

When a user attempts to perform an action that requires administrative privileges, the User Account Control (UAC) feature prompts the user for confirmation through a pop-up screen. This pop-up screen appears in the secure desktop mode, which is a protected environment that blocks other programs from accessing the screen. This ensures that the user can only interact with the UAC prompt and no other malicious programs can interfere or tamper with the prompt. On the other hand, CTRL+ALT_DELETE is a keyboard shortcut that can be used to open the Task Manager, change a password, or log off the current user. It does not necessarily indicate that the OS is in secure desktop mode.

Lastly, the Windows login screen is the initial screen that appears when a user logs in to their Windows account. It is not related to secure desktop mode, which is triggered by UAC prompts. Therefore, if you are looking to identify whether the OS is in secure desktop mode, you should look for the UAC prompt on the screen.

Learn more about Windows here: https://brainly.com/question/13605383

#SPJ11

What are the hardware and software components of a computer

Answers

Answer: See explanation

Explanation:

Computer hardware simply refers to the part of the computer that we can see and also touch. This includes the mouse, keyboard, monitor, central processing unit, monitor etc.

The computer software simply refers to the set of instructions which are used in the operation of the computer. It includes the application programs, operating system etc.

Which type of shape allows you to add text that can be moved around.

Answers

Answer:

Move a text box, WordArt, or shape forward or backward in a stack. Click the WordArt, shape, or text box that you want to move up or down in the stack. On the Drawing Tools Format tab, click either Bring Forward or Send Backward.

what is the fastest-running vulnerability scan, and why does this type of scan run so fast?

Answers

The fastest-running vulnerability scan is known as the Nmap. It typically supports network discovery as well as security scanning.

What are the different types of vulnerability scans?

The different types of vulnerability scans are as follows:

Network-based scanners.Host-based scanners. Wireless scanners. Application scanners. Database scanners.

Nmap is the fastest-running vulnerability scan that also performs port scanning, vulnerability scanning, fingerprinting operating systems, and so on. It is a network scanner created by Gordon Lyon. It is significantly used to discover hosts and services on a computer network by sending packets and analyzing the responses.

Therefore, the fastest-running vulnerability scan is known as the Nmap. It typically supports network discovery as well as security scanning.

To learn more about Vulnerability scans, refer to the link:

https://brainly.com/question/25633298

#SPJ1

Which of the following is not a characteristic of a large database?
a) Optstore items in a filing cabinet.
b) Stores items in a computer such as music.
c) stores large amounts of items such as an online store.
d) can be used as a small recipe book.​

Answers

C is the correct answer

A school is conducting a survey of students to learn more about how they get to school. Students were asked how they travel to school, how long it takes them to get to school, what time they arrive at school, and for a description of their most significant challenges when traveling to school. Several rows of the data collected are shown in the table below.
Which column is data will likely be most difficult to visualize or analyze?
A. How Travel
B. How Long
C. Time Arrive
D. Biggest Challenges

Answers

Answer: D.

Explanation: I can't say this is the correct answer for sure since the chart is not there but I'm pretty sure the answer is D. This video might help you out on the subject. https://youtu.be/dQw4w9WgXcQ

The column in which the data will likely be most difficult to visualize or analyze is Biggest Challenges. The correct option is D.

What is survey?

A survey is a research method that involves gathering information from a group of people through the use of pre-designed questions or structured interviews.

A survey's purpose is to collect information about people's opinions, beliefs, attitudes, behaviors, or experiences on a specific topic.

Biggest Challenges is the column in which the data will most likely be difficult to visualize or analyze.

The table's other columns, How Travel, How Long, and Time Arrive, all contain quantitative data that can be easily visualized and analyzed.

The How Travel column, for example, could be represented by a pie chart or bar graph depicting the percentage of students who walk, bike, drive, or take the bus to school.

Thus, the correct option is D.

For more details regarding survey, visit:

https://brainly.com/question/17373064

#SPJ3

Other Questions
1. Use the following information to answer 3 questions. When heated in a closed container in the presence of a catalyst, potassium chlorate decomposes into potassium chloride and oxygen gas via the following reaction:2KClO3(s) 2KCl(s)+ 3O2(g)If 12.25g potassium chlorate decomposes, how many grams of oxygen will be release?(A) 1.60 g (B) 3.20 g(C) 4.80 g (D) 18.37 g Which statement regarding rocks is correct? Responses Rocks that melt are no longer part of the rock cycle and cannot become rocks again.Rocks that melt are no longer part of the rock cycle and cannot become rocks again. Rocks can break down into smaller rocks but cannot change type.Rocks can break down into smaller rocks but cannot change type. Rocks that break down into smaller particles are no longer part of the rock cycle and cannot become rocks again.Rocks that break down into smaller particles are no longer part of the rock cycle and cannot become rocks again. Rocks can change from one type to another through the rock cycle. 7. Suggest why mercury or coloured alcohol are used in thermometers instead of coloured water? why do wireless networks experience a greater reduction in throughput compared with wired networks? what is the vertical asymptote of f(x)= 7/ x + 5 what was/is the primary economic activity of the cajun people? A search warrant to investigate private property is also known as which of the selections listed below?Select one:A. jury decisionB. court orderC. summary judgementD. civil case How much money should you deposit in a bank so that it would accumulate to 100,000 at 1% simple interest for 10 years? The following table shows the quantity demanded of tickets of Safe Airlines at two different prices, for each of vacation travelers and business travelers. A. Please calculate the price elasticity of demand for each of vacation travelers and business travelers, using the midpoint method to calculate the percentage change (you will see that the price elasticity of demand for airline travel differs when we look at vacation travelers versus business travelers). ( identify the reasons why roosevelts critics opposed the new deal. what is this question 9. Carlos walked 8 miles in 3 hours. Leah walked 14 miles in 6 hours. Are these ratesin proportion? 1. What is the slope of the line in the graph below?A. 1/2B. 2C. -1/2D. -2 6=_-(-8) find the missing value Catheter advanced from the left femoral artery into the aorta, manipulated into both the left and right renal arteries for imaging. What are the CPT code(s) reported?A) 36245, 36245-59B) 36252C) 36245, 36245-59, 36252-26D) 36251 The hypotenuse of a right triangle is on the line y = 3x + 2. The shorter leg ofthe triangle is parallel to the x-axis and is 3 units long. Find the perimeter of thetriangle. Which of the following is a representation of the shape of a p orbital? Stories from the Bible were an important source of subject matter in Renaissance and Baroqueart. Select whichever of these paintings you think depict an episode of Christ's life and place themin the order in which the events happened, from first to last. Each cycle, the working fluid of a sterling engine receives 2.67 kJ of energy in the heat interaction with its combustor. The engine operates with a thermal efficiency of 0.20 and delivers 4 kW of shaft power. Determine (a) the number of cycles executed per minute and (b) the energy rejected as the heat to the low temperature resevoir each cycle. 6 cm9 cmFind the area of the triangle.[?]cm