What is the disadvantage of on-premise?

Answers

Answer 1

Answer:

several.

Explanation:

On-premise solutions typically require a dedicated server room or data center to house the necessary equipment, which can be costly to set up and maintain. In addition, organizations must ensure that their IT staff have the necessary expertise to manage and maintain the on-premise infrastructure. Compared to cloud computing, on-premise solutions also generally have less flexibility and agility. Cloud computing allows for easy scalability, rapid deployment of new services, and the ability to pay for only what you use. On-premise solutions may not be able to match this level of flexibility, particularly for smaller businesses or organizations with limited IT resources.


Related Questions



A software license gives the owner the___
to use software.

Human right
Understanding
Password
Legal right

Answers

Answer:

the legal right

Explanation:

hope that helps

Answer:

Human right

Explanation:

Tell me if I'm wrong

Word's ________ is located on the left side of the title bar and is used to easily save a document or undo or redo a recent command.

Answers

Answer:

quick access toolbar

Explanation:




What is the minimum number of bits required to represent a waveform in 1000 discrete levels? a) 16 b) 12 c) 8 d) 10

Answers

The minimum number of bits required to represent a waveform in 1000 discrete levels is 10. To represent a waveform in 1000 discrete levels, a minimum of 10 bits is required.

Waveform:

In electronics, a waveform refers to the shape of an electrical signal that varies with time.

The correct option is d) 10.

In binary code, bits are the smallest unit of information. It is a contraction of "binary digit," and it can only be one of two values: 0 or 1.

Discrete levels: The signal's amplitude is represented by a certain number of bits, which are then converted to binary. If a signal is divided into 1000 discrete levels, it means that the amplitude is divided into 1000 parts.

2^n = number of discrete levels Where n is the number of bits required.

For 1000 discrete levels, we have:

2^n = 1000Taking the logarithm base 2 of both sides:

log2(2^n) = log2(1000)nlog2(2) = log2(1000)n = log2(1000)/log2(2)n = 9.966

To know more about electronics visit:

https://brainly.com/question/13224410

#SPJ11

how does a company most likely maintain its records of individual items of raw materials?

Answers

Using a bar code system a company most likely maintain its records of individual items of raw materials.

What is a bar code system?

The main components of a barcode system include mobile computers, printers, handheld scanners, infrastructure, and accompanying software. A barcode system is a network of hardware and software. In situations where manual data collecting is neither efficient nor timely, barcode systems are utilized to automate data collection. Barcoding systems are not radio-frequency identification (RFID) systems, although frequently being offered by the same business. Both technologies are widely used by businesses as a part of bigger resource management frameworks. Bernard Silver was a graduate student at Philadelphia's Drexel Institute of Technology in 1948. A local food chain shop owner contacted the Drexel Institute to learn more about research being done on a system for automatically scanning product information at the register. Silver collaborated on a solution with Norman Joseph Woodland, a fellow graduate student.

To know more about bar code system visit:

https://brainly.com/question/14715796

#SPJ1

Checking a website author’s credentials is one way to establish a site’s _________. Group of answer choices security information literacy credibility copyright

Answers

Answer:

The answer is "Credibility".

Explanation:

By assessing the excellently-intended, factual, or unbiased" a Site is, users, assess reliability. It can be achieved by developers, which provides a useful set of information sections, and responses to the links for external sources or resources must be provided.  The credibility of its website is mostly about making the site accurate and accurate. Only 52.8% of internet users agree that digital information is consistent, and the incorrect choice can be defined as follows:

Information on security is used in designing, that's why it's wrong.literacy is used in understanding, that's why it's incorrect.copyright refers to the legal right, that's why it's incorrect.

sheryl is explaining the osi model to new technicians at her company. she is trying to explain what protocols operate at the various layers of the osi model. at what layer of the osi model does tcp operate?

Answers

The Transport layer of the OSI model operates the TCP protocol. Correct answer: letter A.

The Transport layer of the OSI model is responsible for providing reliable end-to-end communication between two hosts. So, it is responsible for ensuring delivery, data sequencing and error control.

What does the OSI model consist of?

The OSI model consists of seven layers:

Physical Layer: Responsible for transmitting raw data bits over physical medium such as cables, radio waves, etc.Data Link Layer: Responsible for formatting and transmitting data frames, which are packets of data that have an address header and trailer attached.Network Layer: Responsible for managing and routing data packets from one network to another.Transport Layer: Responsible for reliable end-to-end delivery of data packets.Session Layer: Responsible for establishing, managing, and terminating communication sessions between two or more computers.Presentation Layer: Responsible for translating, encrypting, and compressing data so that it can be sent across the network.Application Layer: Responsible for providing services to end users, such as web browsing and file transfer.

Sheryl is explaining the OSI model to new technicians at her company. She is trying to explain what protocols operate at the various layers of the OSI model. At what layer of the OSI model does TCP operate?

A. Transport

B. Application

C. Network

D. Data link

Learn more about the OSI model:

https://brainly.com/question/15901869

#SPJ4

Which of the following is a network vulnerability scanner? (Choose two.) A) Nessus B) Keylogger C) Nbtstat D) Nmap E) pathping

Answers

The network vulnerability scanners among the given options are Nessus and Nmap.

How are Nessus and Nmap categorized as network vulnerability scanners?

Nessus and Nmap are both widely recognized network vulnerability scanners that help organizations identify and address security vulnerabilities within their computer networks. Nessus is a powerful and comprehensive vulnerability scanning tool that scans networks, systems, and applications for known vulnerabilities. It provides detailed reports and recommendations to help prioritize and mitigate potential risks.

Nmap, on the other hand, is a versatile network exploration and auditing tool that can also be used for vulnerability scanning. It helps discover hosts, services, and open ports, allowing security professionals to identify potential entry points for attacks. Both Nessus and Nmap play crucial roles in ensuring the security of networks by enabling proactive vulnerability management and risk reduction.

Learn more about Nessus and Nmap

brainly.com/question/32150075

#SPJ11

why did i get blocked

Answers

because you asked something innnapropiate
It depends, maybe it’s on the other person or maybe it’s on you!

what are the keywords check, unique, and not null referred to as?

Answers

The keywords check, unique, and not null are referred to as constraints in a database.

Constraints are rules that are applied to a database to ensure the accuracy, consistency, and integrity of the data stored within it. The check constraint is used to specify a condition that must be true for a record to be inserted or updated in a table. For example, a check constraint could be used to ensure that the value of a field falls within a certain range or meets a specific criteria.

The unique constraint is used to ensure that a column or combination of columns contains only unique values. This is often used to enforce data integrity and prevent duplicates from being entered into a table. The not null constraint is used to ensure that a column cannot contain null or empty values. This is useful for enforcing data completeness and preventing errors that can result from missing data.

Overall, constraints are an important tool for ensuring the accuracy and integrity of the data stored within a database, and are commonly used in various types of database management systems.

You can learn more about keywords at

https://brainly.com/question/9588905

#SPJ11

Translate "God" Into Italian

Answers

Answer:

Dio is god in Italian

Explanation:

hope it helps

Answer:

Dio = God in Italian

Plz answer all the questions :)
1. Your company plans to host large data on the AWS cloud. This data is not required until the client request it. Which AWS storage allows for policies to delete the files after 2 years?
2. Which policy do you utilize for infrequent access to files at the lowest cost?
3. Which policy do you utilize for frequently accessed files with no regard to price?
4. What type of files are you able to store in S3 buckets vs. Elastic Block Storage?
5. S3 buckets only store static content. Is it possible to create a dynamic website using S3 buckets? If so, how?

Answers

Answer:

is there multiple choice or do i have to answer from my own words??

Select the correct text in the passage.
Which statement is true about depth-first search, or DFS?
1. Depth-first search follows multiple paths at the same depth.
2. It explores all nodes for all solutions.
3. It takes up less space than BFS.
4. The time
complexity for DFS is bm.

Answers

The statement that  is true about depth-first search, or DFS  is that It explores all nodes for all solutions.

Check more about DSF services below.

Does depth first search visit every node?

The DFS algorithm is known to be a kind of a recursive algorithm that is said to often make use of the idea of backtracking.

Note that this is one where there is an exhaustive searches of all the nodes by going ahead and also backtracking.

Hence, The statement that  is true about depth-first search, or DFS  is that It explores all nodes for all solutions.

Learn more about depth-first search, from

https://brainly.com/question/15142337

#SPJ1

Jackson is working as part of a large animation team and is having a hard time making the characters move realistically because the “bones” and “joints” in the 3D models have some problems. In what step in the animation process were mistakes made?

A.
animation

B.
visual effects

C.
rigging

D.
rendering

Answers

The step in the animation process that involves some mistakes is rendering. Thus, the correct option for this question is D.

What is the Animation process?

The animation process may be defined as the methodology of formulating the illusion of movement through the utilization of still images in a two-dimensional space. The process of animation significantly includes characters, storyboards, and backgrounds in the form of vector graphics.

The movement of bones and joints in the 3D models has some problems due to the rendering of actual sense to the viewers. The animation of this part is perfect along with visual effects but the delivery of this includes some confusion which creates problems.

Therefore, the step in the animation process that involves some mistakes is rendering. Thus, the correct option for this question is D.

To learn more about the Animation process, refer to the link:

https://brainly.com/question/28152242

#SPJ1

Jack is shooting a scene with a horse running in an open field. Which angle or shooting technique should he use to show the horse in motion?

NO LINKS!!!!

A. Zoom shot
B. Crane shot
C. Tracking shot
D. Panning shot

Answers

Answer:

I would say a panning shot because when you "pan" the camera you're following the object that's moving.

hope this helps! ♥

modern database tools support the separation of data from the programs that manipulate data, which provides . a. predictive analytics b. data independence c. cardinality d. data dependence

Answers

The correct option b.  data dependence. Modern database tools help reduce data dependence. Data dependence refers to the situation where changes to one part of a database affect other parts of the database.

Modern database tools support the separation of data from the programs that manipulate data, which provides data independence. Data independence refers to the ability of a database to change its schema without requiring changes to the programs that use the database. This means that the database schema can be modified without affecting the applications that rely on the data.

By separating the data from the programs that manipulate it, modern database tools enable greater flexibility in database design and maintenance. For example, a database administrator can change the schema of a database to optimize performance or accommodate new data types, without requiring changes to the applications that use the database.In addition to providing data independence, modern database tools also offer a range of other benefits. For instance, they support predictive analytics, which involves using statistical algorithms and machine learning techniques to identify patterns in data and make predictions about future events. Predictive analytics can be used to improve business operations, such as by identifying which products are likely to sell well in the future.Another benefit of modern database tools is that they support cardinality, which refers to the relationship between two sets of data. Cardinality is important in database design because it determines how data is stored and retrieved. For example, a one-to-many relationship between a customer and an order means that one customer can have many orders, but each order belongs to only one customer.

know more about the Modern database tools

https://brainly.com/question/30007221

#SPJ11

g i r l s o n l y j o i n
id= ons jcuv jke

Answers

at least 20 characters long

A large company has a LAN. The manager of the company wants to change it to a WAN
What network device would be needed to create the WAN

Answers

Answer:

\(\bold{\huge{\fbox{\color{Green}{☑Verified\:Answer}}}}\)

Explanation:

Router. A router is a networking device typically used to interconnect LANs to form a wide area network (WAN) and as such is referred to as a WAN device. IP routers use IP addresses to determine where to forward packets. An IP address is a numeric label assigned to each connected network device.

Fям:- \(\small\tt{\blue{(brainly.in)}}\)

A customer seeks to buy A new computer for private use at home. The customer primarily needs the computer to use the microsoft powerpoint application for the purpose of practising representation skills. As a salesperson what size hard disc would you recommend and why?

Answers

Answer:

I think 128GB of storage would be fine.

Explanation:

It sounds like this person he's only looking to do basic tasks as you would still have room to do other things.

with a linear production function there is a:
a. fixed-proportion relationship between all inputs
b. variable-proportion relationship between all inputs
c. perfect complementary relationship between alll inputs
d. perfect substitutable relationship between all inputs.

Answers

With a linear production function, there is a fixed-proportion relationship between all inputs. Therefore, the answer is: a. fixed-proportion relationship between all inputs

With a linear production function, there is a fixed-proportion relationship between all inputs. This means that the ratio of inputs used in production remains constant, regardless of changes in the quantities of inputs. In other words, the marginal product of each input remains constant as more of that input is added, and the ratio of the marginal products of any two inputs is constant.  

For example, if the production function is Y = aX1 + bX2, where X1 and X2 are inputs and a and b are constants, then the ratio of X1 to X2 used in production will remain the same, even if the quantities of X1 and X2 change.

To learn more about linear production function visit : https://brainly.com/question/31435651

#SPJ11

the cost to ship a package is a flat fee of 75 cents plus 25 cents per pound. 1. declare a const named cents per pound and initialize with 25. 2. get the shipping weight from user input storing the weight into shipweightpounds. (remember %d is used to read in an integer from the user.) 3. using flat fee cents and cents per pound constants, assign shipcostcents with the cost of shipping a package weighing shipweightpounds. c programming

Answers

The price of shipping a package containing c programming that weighs shipweight pounds

const int CENTS_PER_POUND = 25;

int shipweight pounds;

printf ("Enter the shipping weight in pounds: ");

scanf ("%d", &shipweigh tpounds);

int shipcostcents = 75 + (shipweight pounds * CENTS_PER_POUND);

What is weight?

It is a measurement of the heaviness of an object, and is determined by the gravitational pull of the Earth or other celestial objects on the object. Weight is measured in Newtons, kilograms, and pounds, depending on the system of measurement used. Weight is affected by the mass of the object, its location in the universe, and the gravitational pull of the Earth or other celestial bodies on the object.

To learn more about weight
https://brainly.com/question/28800918
#SPJ4

Joe is covering a music concert with more than 2,000 people in the audience. Which shooting technique should he use to capture the entire audience in one shot?
A.
Dutch angle
B.
tracking shot
C.
track in shot
D.
crane shot
E.
panning shot

Answers

Answer:

e

Explanation:

Answer:

D. Crane Shot

Explanation:

Assign numMatches with the number of elements in userValues that equal matchValue. Ex: If matchvalue = 2 and uservals = [2, 2, 1, 2], then numMatches = 3. function numMatches = Findvalues(uservalues, matchvalue) % userValues: User defined array of values % matchValue: Desired match value arraysize = 4; % Number of elements in uservalues array numMatches = 0: % Number of elements that equal desired match value % Write a for loop that assigns numMatches with the number of % elements in uservalues that equal matchvalue.

Answers

The provided code defines a function called "Findvalues" that takes two input arguments: "uservalues" (an array of user-defined values) and "matchvalue" (the desired value to match).

The goal is to determine the number of elements in "uservalues" that equal "matchvalue" and assign this count to the variable "numMatches".To accomplish this, the code initializes "numMatches" to 0 and then utilizes a for loop to iterate through each element in "uservalues". Inside the loop, it checks if the current element is equal to "matchvalue" and increments "numMatches" by 1 if a match is found.

The implementation of the function is as follows:

function numMatches = Findvalues(uservalues, matchvalue)

   arraysize = numel(uservalues); % Number of elements in uservalues array

   numMatches = 0; % Number of elements that equal the desired match value

   % Iterate through each element in uservalues

   for i = 1:arraysize

       % Check if the current element is equal to matchvalue

       if uservalues(i) == matchvalue

           numMatches = numMatches + 1; % Increment numMatches

       end

   end

end

This function can be called with the appropriate arguments to determine the number of elements in "uservalues" that equal "matchvalue". For example, if "uservalues" is [2, 2, 1, 2] and "matchvalue" is 2, the function will return numMatches as 3.

Learn more about matchvalue here: brainly.com/question/15739286
#SPJ11

Why should we follow the codes of conduct while using technology that provides us information

Answers

Codes of conduct are guidelines that outline appropriate behavior and actions when using technology. They are established to ensure that the use of technology is ethical, responsible, and respectful of others. Following codes of conduct while using technology that provides information is important for several reasons:

Respect for privacy and personal information: Codes of conduct help protect individuals' privacy and personal information, by outlining guidelines for collecting, storing, and sharing data.

Ethical use of information: Codes of conduct help ensure that the information provided is used ethically and in a manner that is not harmful to others.

Fairness and accuracy: Codes of conduct help ensure that information is presented in a fair and accurate manner, avoiding bias, manipulation and spreading misinformation.

Maintaining trust: By following codes of conduct, individuals and organizations can maintain the trust of the public by being transparent and accountable in their use of technology and information.

Compliance with laws and regulations: Codes of conduct also help individuals and organizations comply with laws and regulations related to the use of technology and information.

Overall codes of conduct help to promote responsible and ethical behavior in the use of technology and information, which can have a positive impact on society as a whole.

Three teams (Team A, Team B, and Team C) are participating in a trivia contest. Let scoreA represent the number of correct questions for Team A, scoreB represent the number of correct questions for Team B, and scoreC represent the number of correct questions for Team C. Assuming no two teams get the same number of correct questions, what code segments correctly displays the team with the highest number of correct questions?

Answers

To make comparison between a set of variables, the if-else statement is usually employed, Hence, the correct code segment which displays the team with the highest number of correct questions is the option A.

First it checks if ScoreA > ScoreB ; - - - #1st blockIf True ; then check if ScoreA > ScoreC ;

Then TeamA will be the highest, if otherwise then it will be TeamC

If the 1st block is false, then ScoreB > ScoreA;then check if ScoreB > ScoreC ;Then TeamB will be the highest, if otherwise then it will be TeamC

Hence, the correct option is A.

Learn more : https://brainly.com/question/25675806

Three teams (Team A, Team B, and Team C) are participating in a trivia contest. Let scoreA represent
Three teams (Team A, Team B, and Team C) are participating in a trivia contest. Let scoreA represent

Answer:

A

Explanation:

Your company emphasizes the important of conserving (not wasting)
resources. How can you support that value when you print an 8-page report
you were asked to bring to your department's monthly meeting?
A. Use the Save option to choose a format readers can open.
B. Post the report online before printing it.
C. Use the Print option to create extra copies.
D. Use the Print option for two-sided printing.
SUBMIT

Answers

Answer:

D. Use the Print option for two-sided printing.

Explanation:

ape x

Answer:

D

Explanation:

the type of secondary storage device that uses rigid metallic platters to store programs and very large data files.

Answers

The type of secondary storage device that uses rigid metallic platters to store programs and very large data files is a hard disk.

Hard disks use rigid metallic platters that provide a large amount of storage capacity. They store data and programs by altering the electromagnetic charges on the platter's surface. Hard disks are typically used to store programs and very large data files , and are often used as the primary storage device in a computer system.

A hard disk is a non-volatile storage device used to store digital data. It contains one or more spinning platters that are coated with magnetic material. When the disk spins, a read/write head moves across the platters, which can magnetically read and write data. Hard disks are used for long-term storage of large amounts of data, and are typically much larger than other storage devices like RAM, USB flash drives, and solid-state drives. Hard disks are also relatively inexpensive and are often used in computers, laptops, and other devices for long-term storage.

Learn more about hard disk:

https://brainly.com/question/28476555

#SPJ4

HOW TO USE THIS IN A STORY CAN ANYONE HELP PICK % WORD FROM THE PAGE AN MAKE A STORY WHY DO I LIKE SUMMER ?????////
get 60 piont if you if you help meeeeeeeeeeee
ASAPPPPPPPPPPPPPPPPPPPPPP


The sunshine
Light mornings
Long light nights
BBQs in the garden
The smell of sun cream
Pretty wildflowers
Cloudless blue skies
Going to the beach
Feeling the warm sun on your face
Summer clothes
Sunglasses
Picnics in the park
Long walks
Sitting out on a warm evening
Eating fresh tasty salads
Drinking sangria
Orange glowy sunsets
Fresh air
Exploring new places
Ice cream (or Dairy Free alternative)
Summer playlists
Road trips
Eating fresh strawberries
Ice cold drinks on a hot day
The smell of freshly cut grass
Not having to wear a jacket when out
Autumn is just around the corner
Holidays at home or abroad
Salty sea breezes
Summer always seems to make people happier

Answers

Answer:

Picnic in the Park

Explanation:

Parks are my favorite spots to chill or go for a stroll. Parks make walking in a neighborhood more fun and offer space for common sports, promoting physical activity. They have hiking trails and other amenities to get people moving. Every place, in my opinion, needs some green space where people can get away from the crowds. I live near a park, so if the weather is good, I usually go there once or twice a week. Therefor, my favorite summer activity is going to the park.

why do most operating systems let users make changes

Answers

By these changes you most likely are thinking of the term 'Over Clocking'
Over Clocking is used on most Operating Systems to bring the item your over clocking to the max.
Over Clocking; is mostly used for Crypto mining and gaming.

what is the term for sending emails that imitate legitimate companies?

Answers

Answer:

phishing,,,, it imitates the company email so that when you get on the mail it can collect all your data and then can begin to hack using your information such as password

Phishing refers to the malicious attack method by attackers who imitate legitimate companies in sending emails in order to entice people to share their passwords, credit card or other sensitive personal information. ... If you do surrender such information, the attacker will immediately capture your personal information.

Why is a cable modem classified as a digital model?

Group of answer choices


It only sends digital data over a digital line.


It sends and receives digital data over a digital line.


It only receives digital data over a digital line.


It uses copper wires to enable efficient digital data transfers

Answers

A cable modem is classified as a digital modem because it enables the transmission and reception of digital data over a digital line.

Cable modems use the cable TV infrastructure to transmit data, which is designed to carry digital signals. The digital data that is transmitted over the cable line is then converted to analog signals to be carried over the cable line to a subscriber's home. At the subscriber's home, the cable modem then converts the analog signals back to digital data. The use of digital technology allows for faster and more efficient data transmission and reception, which is why cable modems are classified as digital modems. While copper wires are used in the transmission of data, they are not the sole reason why cable modems are classified as digital modems.

To know more about  modem click here:

brainly.com/question/14619697

#SPJ4

Other Questions
Which of the following is NOT identified as an essential element of programming for adolescent girls?a. Staying in a physically and emotionally safe space.b. Opportunities to develop relationships of trust and interdependence with other women present in their lives.c. Frequent opportunities to interact with adolescent boys in order to learn essential social skills.d. Education about women's health and female development. Bas-relief, often called _______________ is a technique in which figures project only slightly from the background, while _____________ describes sculptures that project more boldly from the background simplify completely What command can be used to remove partitions and convert a drive to gpt? group of answer choices Return to this page to examine the casualties of the war. Which of these battles saw the greatest number of American casualties?Siege of VicksburgBattle of GettysburgBattle of FredericksburgBattle of Antietam Find the area of the given geometric figure.8 mRectangle8.5 m 9. Which of the following is the most appropriate thesis sentence for an essay on the effects of television violence on the youth of today?A;Television violence has negative effects.B:Clearly, murder is wrong and ought to be treated seriously.C:Today's youth are at risk for not taking violent actions such as murder, armed robbery, and muggings seriouslyD:Therefore, television violence has a negative effect on today's youth by making them take a lighthearted stance toward the death of a fellow human being Can someone please give me the (Answers) to this? ... please ...I need help. What probability distribution is used to estimate the completion time for the critical path of a project?a. Alphab. Betac. Gammad. Normal Compltez les blancs avec l'article dfini, puis (then) avec l'article indfini.Exemple: la tlvision, une tlvision_____ division_____ division_____ tableau_____ tableau_____ priorit_____ priorit_____ universit_____ universit_____ sandwich_____ sandwich_____ femme_____ femme_____ partition_____ partition_____ homme_____ homme when live rats were used as the cs in pavlovian food conditioning trials presented to other, subject rats, the subject rats treated the cs rats in a manner: CAN SOMEONE PLEASE HELP ITS DUE TODAY Explain the function and use of the Privileges and Immunities Clause. A landscape plan includes a rectangular flower bed that is surrounded the wood planks. In the drawing, the rectangular flower bed is 4 in. by 5 in. The length and width of the actual flower bed will be 30 times larger than the length and width in the drawing. What is the perimeter of the drawing? Show your work. What is the perimeter of the actual flower bed? Show your work. What is the effect on the perimeter of the flower bed with the dimensions are multiplied by 24? Show your work. The clinical spectrum of acute coronary syndrome includesA. unstable angina and STEMI.B. unstable angina and NSTEMI.C. stable angina and sudden cardiac death.D. unstable angina, STEMI, and NSTEMI. Write Character-Sketch of Rahim Khan when salt dissolves into water does it change its state A laboratory assistant needs to prepare 35. 2 liters of hydrogen at 25. 0C and 101. 3 kilopascals. This is the equation for the reaction: 2HCl Ca H2 CaCl2 What volume of 2. 3 M hydrochloric acid is required to produce this much gas? Use the ideal gas resource. A. 0. 625 L B. 0. 876 L C. 1. 18 L D. 1. 25 L. I am a seed with 3 letters in my name. Take the last 2 out and I still sound the same. What am I? Which is the best definition of psychology? *O the scientific study of the individualO the study of thoughts and actionsthe study of how humans thinkthe scientific study of our cognitive thought and behavior