Which of the following best describes the Platform as a Service (PaaS) cloud computing service model?
A. PaaS delivers infrastructure to the client, such as processing, storage, networks, and virtualizedenvironments.
B. PaaS delivers everything a developer needs to build an application onto the cloud infrastructure.
C. PaaS delivers software applications to the client either over the internet or on a local area network.
D. PaaS stores and provides data from a centralized location without the need for local collection andstorage.

Answers

Answer 1

The best description of the Platform as a Service (PaaS) cloud computing service model is :

B. PaaS delivers everything a developer needs to build an application onto the cloud infrastructure.

Platform as a Service (PaaS) provides developers with the tools, programming languages, and middleware necessary to develop, test, deploy, and manage their applications without having to worry about the underlying infrastructure. PaaS providers also manage the servers, storage, and networking infrastructure required to run the applications.

Option A describes the Infrastructure as a Service (IaaS) model, where a cloud provider offers virtualized computing resources, such as processing power, storage, and networks, that clients can use to build their own environments.

Option C describes the Software as a Service (SaaS) model, where a cloud provider delivers software applications to clients over the internet.

Option D does not accurately describe any of the cloud computing service models, as it suggests a centralized storage system but does not specify any other features of the cloud service.

Thus, the correct option is (B).

To learn more about PaaS visit : https://brainly.com/question/28128247

#SPJ11


Related Questions

what are the requirements that two relations must satisfy to be considered union-compatible?

Answers

To be considered union-compatible, two relations must satisfy the following requirements:

1.  Same number of attributes: Both relations should have the same number of columns (attributes).
2. Corresponding attributes' compatibility: The attributes in the same positions of both relations should have the same domain, meaning they should represent the same type of data.

3. The attributes must be in the same order: The order of attributes in both relations must be the same. The first attribute in one relation should correspond to the first attribute in the other relation, the second attribute to the second attribute, and so on.

These requirements ensure that the two relations have a consistent structure and can be combined using the union operation. The union operation combines the tuples (rows) of two relations into a single relation, resulting in a new relation that includes all the tuples from both relations while maintaining the same attribute structure.

Union compatibility is important in relational algebra and SQL operations that involve combining or merging data from multiple relations. By satisfying the requirements of union compatibility, it becomes possible to perform operations such as union, intersection, and difference on the relations, allowing for data integration and analysis across multiple sources.

When these requirements are met, the two relations can be combined using the union operation.

To know more about the SQL, click here;

https://brainly.com/question/31663284

#SPJ11

What is the main difference between structured and unstructured data?

What is the main difference between structured and unstructured data?

Answers

Answer:

answer is 4.

Explanation:

for an instance let's say you've got to make list of students who would stay after school for sports.then you have to collect data such as Student name _gender _the sport he or she will attend to. Then you get three columns of table to do that when you write those you can get a clear information seeing those data..

Which of the following commands allows the user to round the edges off the selected segments?
Rotate
Stretch
Linetype
Filet

Answers

Answer:

rotate

hope it helps

Explanation:

to round the edges off selected segment rotate can do it

Write three statements to print the first three elements of array runTimes. Follow each statement with a newline. Ex: If runTime = {800, 775, 790, 805, 808}, print:
800
775
790

Answers

Answer:

Answered below

Explanation:

//Program is written in Java.

public void first three elements(int[] nums){

int I;

//Check if array has up to three elements

if(nums.length > 3){

for(I = 0; I < nums.length; I++){

while (I < 3){

System.out.println(nums [I]);

}

}

else{

System.out.print("Array does not contain up to three elements");

}

}

}

We are trying to protect a household computer. We have implemented password-based authentication to protect sensitive data. Which levels of attacker motivation can this authentication typically protect against in this situation

Answers

Password-based authentication can typically protect against attackers with low to moderate levels of motivation. In the case of a household computer, the primary concern is typically unauthorized access by individuals who may have physical access to the computer, such as family members, friends, or visitors.

Password-based authentication can effectively deter casual attackers with low motivation, such as curious family members or friends, who may attempt to access the computer out of curiosity or without malicious intent. It can also provide a basic level of protection against attackers with moderate motivation, such as individuals who may want to access sensitive personal information, steal data or engage in identity theft.

However, it is important to note that password-based authentication may not be sufficient to protect against attackers with high levels of motivation, such as professional hackers or cybercriminals who are well-versed in hacking techniques and have the resources and skills to crack passwords or bypass authentication measures. These attackers may use advanced techniques such as phishing, social engineering, or brute-force attacks to gain access to the computer or steal sensitive data.

Therefore, it is important to complement password-based authentication with other security measures such as regular software updates, anti-virus software, and firewall protection, as well as following best practices such as avoiding suspicious links, using strong passwords, and keeping sensitive information encrypted.

Learn more about authentication here:

https://brainly.com/question/31525598

#SPJ11

how to get rid of this weird line at the top of my screen

how to get rid of this weird line at the top of my screen

Answers

It's difficult to provide a solution without more information about the nature of the line you're seeing, the device you're using, and the software you're running.

What is computer screen?

However, here are a few general troubleshooting steps you can try:

Restart your device: Sometimes a simple restart can fix many software-related issues.

Check for updates: If you're using a device that's running an operating system, check if there are any available updates. Installing updates can often fix bugs and improve the overall performance of your device.

Run a virus scan: If you suspect that the line may be caused by malware, run a virus scan using your preferred antivirus software.

Check your display settings: Depending on your device and operating system, you may be able to adjust display settings, such as the resolution or refresh rate. Experiment with adjusting these settings to see if it resolves the issue.

Lastly, Seek technical support: If none of the above steps work, consider seeking technical support from the manufacturer of your device or from a qualified technician. They may be able to diagnose and fix the issue more effectively.

Learn more about computer screen from

https://brainly.com/question/9017156

#SPJ1

g explain the compute, network, storage, database, and management components of infrastructure-as-a-service (iaas). include the features and how they may benefit organizations. include any considerations that may be particularly important for an organization to consider when adopting iaas.

Answers

Compute, network, storage, database, and management** are essential components of Infrastructure-as-a-Service (IaaS). In IaaS, **compute** refers to the virtualized processing power that allows organizations to run applications and perform tasks on remote servers.

Network encompasses the connectivity and infrastructure that enables data transfer between servers and devices. **Storage** refers to the provision of scalable and on-demand storage resources for data and files. Database involves the management and hosting of databases in the cloud, providing efficient and accessible data storage. Management includes tools and services that allow organizations to monitor, control, and optimize their cloud infrastructure.

The features of these components provide numerous benefits to organizations. With IaaS, **compute** resources can be scaled up or down based on demand, allowing organizations to pay for only the resources they require. This flexibility promotes cost-efficiency and agility in deploying applications and services. The network component ensures reliable and secure connectivity, enabling seamless communication between different components and users. Storage in IaaS allows organizations to store and retrieve data easily, with the ability to expand storage capacity as needed. It eliminates the need for physical storage infrastructure, reducing costs and providing scalability. The **database** component offers managed database services, reducing the complexity of database administration and enabling efficient data storage and retrieval. Lastly, **management** tools provide organizations with centralized control, monitoring, and automation capabilities, enhancing operational efficiency and facilitating resource optimization.

When adopting IaaS, organizations should consider several important considerations. Security is a critical aspect, as sensitive data is hosted on external servers. Organizations need to ensure robust security measures are in place, including data encryption, access controls, and regular security audits. Compliance with industry regulations must also be considered to meet specific requirements. Organizations should evaluate service-level agreements (SLAs) to understand the performance, availability, and reliability commitments from the IaaS provider. Additionally, organizations should assess the provider's scalability and interoperability capabilities, as well as the ease of migrating existing applications and data to the cloud environment. Cost management is another consideration, as organizations need to understand pricing models, potential hidden costs, and optimize resource utilization to control expenses.

In summary, Infrastructure-as-a-Service (IaaS) comprises compute, network, storage, database, and management components. These components offer scalability, flexibility, efficiency, and cost benefits to organizations. However, organizations should consider security, compliance, SLAs, scalability, interoperability, migration, and cost management when adopting IaaS to ensure a successful and optimized cloud infrastructure.

Learn more about database here

https://brainly.com/question/24027204

#SPJ11

Jason is creating a web page on the basic parts of a camera. He has to use a mix of both images and content for the web page to help identify different parts of a camera. What screen design techniques should he apply to maintain consistency in the content and images? A. balance and symmetry B. balance and color palette C. balance and screen navigation D. balance and screen focus

Answers

A. Balance and symmetry would be the most appropriate screen design techniques to maintain consistency in the content and images on the web page about the basic parts of a camera. Balance refers to the even distribution of elements on the screen, and symmetry is a specific type of balance that involves creating a mirror image effect. By applying balance and symmetry, Jason can ensure that the content and images are evenly distributed and aligned, which can make the web page more visually appealing and easier to understand.

a(n) is a program that simultaneously translates and executes each instruction in a high-level language program. question 67 options: assembler interpreter compiler lexical analyzer

Answers

a(n) program known as an interpreter simultaneously interprets and executes each instruction in a high-level language program.

Only binary code can be read by computers and executed. C, Python, and Java are examples of high-level programming languages used by programmers. These languages are simpler to use since they mimic both mathematical notation and human languages. The code created in a high-level language, however, cannot be executed by computers. It needs to be converted into binary code first. Compilers and interpreters are used to do this. Compilable languages are those whose programs are typically created by compilation. The same term is used to describe languages that humans typically interpret. A programming language that is generally interpreted rather than compiled into machine instructions is known as an interpreted language. It is a type of program where the instructions are read by another program and then executed, rather than being carried out directly by the target machine.

Learn more about interpreter here:

https://brainly.com/question/13072006

#SPJ4

which type of mirror can create a real image.

Answers

Answer:

concave mirror

Explanation:

hope this helps!!!

Answer:

A. concave

Hope this helps!

Explanation:

If an artist’s work is shared for free under certain situations but not others; this is usually because it is under _____, with the artist’s knowledge.

A.
copyright law

B.
ownership

C.
sales taxation

D.
fair use rules

Answers

Answer:

Fair  Use Rules

Explanation:

THE GOVERNMENTSJBVHUIEGUI:SDVGD

for 8a2e:370:7334 and prefix length 107, what is the total number of hosts?

Answers

The total number of hosts for the given IPv6 address 8a2e:370:7334 with a prefix length of 107 is \(2^{57}\) - 2.

The IPv6 address 8a2e:370:7334 represents a 128-bit address space. The prefix length of 107 indicates that the first 107 bits of the address are used for the network prefix, leaving 128 - 107 = 21 bits for the host portion.

In IPv6, the host portion is used to identify individual hosts within a network. With 21 bits available for the host portion, we can calculate the total number of hosts by taking 2 raised to the power of the number of bits (\(2^{21}\)).

However, in IPv6, the all-zeroes and all-ones host addresses are reserved. Therefore, we subtract 2 from the total number of possible host addresses to exclude these reserved addresses.

So, the total number of hosts is \(2^{21}\) - 2, which equals 2,097,152 - 2 = 2,097,150 hosts.

Learn more about IPv6 addressing

brainly.com/question/4594442

#SPJ11

Data must be organized based on the sensitivity of the information. In the military, creators of sensitive information would officially label data as which of the following? (Select all that apply.)
A- Secret
B- Non-classified
C- Classified
D- Top Secret

Answers

Secret and Top-Secret.

Which one of the following raises security issues when a new app is installed on a smart phone?

saving of data.Whether the data you keep on the phone is available to other apps is the most frequent security risk for an Android application.

What three types of information security are there?

The three fundamental components of an information security concept known as the CIA triad are confidentiality, integrity, and availability.

to know more about sensitive information visit:

https://brainly.com/question/28499853

#SPJ4

The accuracy of digital indicators shall be _________ of the operating pressure at which they are used.

Answers

The accuracy of digital indicators is typically defined as a percentage or fraction of the operating pressure at which they are utilized.

This means that the precision and reliability of these indicators are specified in relation to the pressure range they are designed to measure. For example, if a digital indicator has an accuracy of ±1% of the operating pressure, it implies that the displayed value can deviate by up to 1% of the actual pressure within that range. This accuracy requirement ensures that the digital indicators provide reliable and consistent measurements within the specified pressure limits, allowing users to make informed decisions based on accurate data. By adhering to these accuracy standards, digital indicators can enhance the efficiency and safety of various industrial processes that rely on precise pressure monitoring.

To learn more about  indicators  click on the link below:

brainly.com/question/32454519

#SPJ11

xyz, inc has a new order entry system that uses the old databases. the shipping addresses are correct in one system, but the billing address is located in another system. the company is experiencing a(n) .

Answers

Since the shipping addresses are correct in one system, but the billing address is located in another system, this company is experiencing a data integrity problem.

What is data?

Data can be defined as a representation of factual instructions (information) in a formalized and structured manner, especially as a series of binary digits (bits) or strings that are used on computer systems in a company.

What is data integrity?

In database management system (DBMS), data integrity can be defined as a measure of the level of accuracy and consistency of the data that are stored in a data warehouse, relational database, data mart, or other data storage system.

This ultimately implies that, data integrity simply refers to a measure of data quality, veracity, consistency, accuracy, and credibility, which is missing in this company's old databases.

Read more on data integrity here: https://brainly.com/question/26800051

#SPJ1

5.13.6 Invert Filter code hs

Answers

Inverter filter is a device that shows a person what exactly they look like when looking at the output form a camera.

Why  is it used ?

The inverted filter shows you what you truly look like/how others view your face. When you glance in the mirror or take a selfie, you're undoubtedly used to seeing your own face. However, this is due to the fact that your face is reflected.

When you use the filter, you're looking at your "unflipped" picture, or the version of yourself that everyone else sees when they look at you. When we gaze at an inverted image or video, it might feel like we're seeing a whole other version of ourselves.

Learn more about filters;
https://brainly.com/question/8721538
#SPJ1

This graph shows the number of steps Ana and Curtis each took over the course of four days. Which of the following labels best describes the y-axis values? Number of Steps per Day 12000 10000 8000 6000 رااا 4000 2000 0 1 2 3 Ana Curtis
Steps per day
None of the above
Day of the week
Steps by user​

This graph shows the number of steps Ana and Curtis each took over the course of four days. Which of

Answers

Answer:

None of the above

Explanation:

2. Write a 7-10 sentence paragraph explaining the concept of a spreadsheet. 10​

Answers

Answer:

Explanation: A spreadsheet is considered a configuration of rows and columns. It can also be called a worksheet. Spreadsheets are used for calculating and comparing numerical and financial data.

The values in the spreadsheet can be either basic or derived. Basic values are independent values and the derived values are the outcome of any function or an arithmetic expression.

Spreadsheet applications are computer programs that allow users to add and process data. One of the most widely used spreadsheet software that is used is Microsoft Excel.

A file in an excel sheet is referred to as a workbook and each workbook consists of worksheets where the data is entered for further processing.

The concept of the spreadsheet can be understood with the following terminologies, which are as follows.

Label: Text or special characters are treated as labels for rows, columns, or descriptive information. There is no way of treating the labels mathematically, i.e labels cannot be multiplied or subtracted, etc.

Formulas: Formula refers to a mathematical calculation that is performed on a set of cells. Formulas are represented with an equal sign at the start of the spreadsheet.

Critical thinking questions

this lesson showed you the general form of the syntax for a for loop in javascript:

for (initialize counter; condition; update counter) {

code block;}


what does each part do, and why is it necessary?

consider this javascript loop:

var new = 0;

for (i=3;i<=5;i++){

new=new+i;}


explain what the loop does and what the result of executing it will be.

most people are annoyed when they are asked to type in their password more than once. can you think of a way to perform data verification that does not require users to type in their password twice?

a website asks the user to enter his or her date of birth with the month first and then the day of the month. describe what you could do to prevent problems with the code if a user enters the information in the wrong order by placing the day of the month before the month.

your classmate is frustrated because the code that was designed to add up her five quiz grades is not working properly. what change would you suggest to your classmate based on this code?

for (i=1;i<=5;i++){

sum=0

sum=sum+i;}

Answers

Answer:

1: A loop will continue running until the defined condition returns false . ... You can type js for , js while or js do while to get more info on any of these. ... initialization - Run before the first execution on the loop. ... But it can be used to decrement a counter too.

2: The loop increments the value of new while the loop condition is true. The end value of new is 3.

3: We could use some sort of finger recognition or face so they don’t have to type in their password.

4: give them a second chance for their date of birth.

5: sum = 0 must be before for loop. If inside for loop, it will keep resetting sum to 0 each iteration.

Explanation:

a table is the starting point for entering, finding, and reporting useful information located in the database. T/F?

Answers

True. A table is the basic unit of a database and it serves as the foundation for organizing and storing data.

Tables contain columns that define the type of data that can be entered and rows that contain the actual data. When data is entered into a table, it can be easily found and retrieved by querying the database. Tables also allow for the creation of reports that can summarize and analyze the data in various ways, allowing users to derive useful insights and make informed decisions. Therefore, it can be concluded that a table is indeed the starting point for entering, finding, and reporting useful information located in the database.

learn more about  database here:

https://brainly.com/question/30163202

#SPJ11

Select the correct answer.
Linda is making handouts for her upcoming presentation. She wants the handouts to be comprehensible to people who do not attend her
presentation. Which practice should Linda follow to achieve this goal?
OA.
OB.
OC.
OD.
provide a summary of the presentation
make the handouts more image-oriented
speak in detail about each topic
provide onlya printout of the slideshow


Can someone please help me with this class b4 I lose my mind
Amos: xoxo_11n

Answers

Answer:

OA

Explanation:

I took this quiz

10 EASY POINTS❗️

1. If I give brainlist, will one of my brainlist be gone?
2. How do I make a question with 5 points instead of 10?

Answers

Answer:

You can't make something 5 points bc 10 is the minimum I believe. As for the BRAINIEST I'm not sure

Answer:

your brainiest wont be gone and there should be a button under where you type the question to change the point value

People use ______ robots to communicate and interact with others via remote control.
A. industrial
B. telepresence
C. AI
D. telemanipulation

Answers

People use telepresence robots to communicate and interact with others via remote control.

Telepresence robots are a type of robot that enables a person to interact with others in a remote location through the use of a robot that can be controlled from a distance. These robots are typically equipped with cameras, microphones, and speakers that allow the person to see, hear, and speak to others in real-time. They are commonly used in situations where a person cannot physically be present, such as in business meetings, classrooms, or medical consultations. By using a telepresence robot, a person can participate in activities and interact with others in a way that would otherwise be impossible. Overall, telepresence robots are an innovative and useful technology that can help to bridge the gap between physical and remote communication.

To learn more about communicate

https://brainly.com/question/30129889

#SPJ11

have a folder on your Windows computer that you would like to share with members of your development team. Users should be able to view and edit any file in the shared folder. You share the folder and give Everyone Full Control permission to the shared folder. Users connect to the shared folder and report that they can open the files, but they cannot modify any of the files. Which of the following would be the BEST action to take next? Create new user accounts for each user and assign the necessary folder permissions. Install Samba on your workstation and then configure permissions using Samba. Create a group and make all user accounts members of the group. Grant Full Control share permissions to the group.

Answers

Answer:

Create a group and make all user accounts members of the group.

Explanation:

What is the main function of a CD-RW.​

Answers

Answer:

A CD-RW (which stands for Compact Disc ReWritable) is a Compact disc that can be recorded and erased multiple times. It can hold data or music. Most of the time it will hold data, since many CD players can not play CD-RWs. During its development, the format was known as CD-E, which stands for Compact Disc Erasable.

example of tools and components at home​

Answers

Answer:

SOLDER REMOVER

SOLDERING STATION

SOLDERING IRON

PRECISION SCREW DRIVER SET

Knowledge Spark, a school with no current job openings, wants to change to a completely virtual environment and offer classes to students around the world. A career with this company has


existing demand right now and good projection for demand in the future

existing demand right now but no projection for demand in the future

no demand right now and no projection for demand in the future

no demand right now but good projection for demand in the future

John carl pls help me

Answers

In the given scenario, Knowledge Spark is a school that has no current job openings. The school has a desire to change to a completely virtual environment and offer classes to students worldwide. There is a possibility that this school may create job openings in the future.

Therefore, it can be concluded that the correct option is "No demand right now but good projection for demand in the future."Career opportunities with a company have always been an essential factor to consider. One of the factors that determine if a career has demand is if the company is successful or has a good prospect.

In the given scenario, Knowledge Spark aims to create a completely virtual environment and offer classes worldwide. As we are currently in a pandemic situation, creating a virtual environment can increase job opportunities as most companies are shifting to online services.

Many students worldwide are choosing virtual classes instead of traditional classes for convenience and safety. Therefore, we can conclude that this company has no existing demand for jobs at present. However, there is good projection for demand in the future.

To know more about scenario visit;

https://brainly.com/question/32720595

#SPJ11

To uncompress the data back into its original binary state, you simply reverse the process. This technique is an example of what type of compression?

Answers

Answer:

losless compression

Explanation:

Select the correct answer.
What needs to be defined throughout an animation sequence to define the start and end points of motion?

A frames
B. characters
C. key frames
D. movement

Answers

i think the answer is c

Write in Python

11.3

Write in Python11.3

Answers

Answer:

A simple program of the Person and Customer classes in Python

class Person:

   def __init__(self, name, address, telephone_number):

       self.name = name

       self.address = address

       self.telephone_number = telephone_number

class Customer(Person):

   def __init__(self, name, address, telephone_number, customer_number, mailing_list):

       super().__init__(name, address, telephone_number)

       self.customer_number = customer_number

       self.mailing_list = mailing_list

# Creating an instance of the Customer class

customer1 = Customer("John Doe", "123 Main St", "555-1234", "C12345", True)

# Accessing attributes of the customer

print("Customer Name:", customer1.name)

print("Customer Address:", customer1.address)

print("Customer Telephone Number:", customer1.telephone_number)

print("Customer Number:", customer1.customer_number)

print("Wants to be on Mailing List:", customer1.mailing_list)

Explanation:

In this example, the Person class is the base class, and the Customer class is a subclass of Person. The Person class has data attributes for a person's name, address, and telephone number. The Customer class extends the Person class and adds two additional data attributes: customer_number and mailing_list.

The __init__ method is used to initialize the attributes of each class. The super().__init__() call in the Customer class ensures that the attributes from the Person class are also initialized properly.

Finally, an instance of the Customer class (customer1) is created and its attributes are accessed and printed in a simple program.

Other Questions
Gulf Shores Inn is comparing two separate capital structures. The first structure consists of 385,000 shares of stock and no debt. The second structure consists of 354,000 shares of stock and $2.46 million of debt. What is the price per share of equity? Angles 1 and 2 or complementary. If HELP ME PLEASE PLEASD When using the order of operations to evaluate an expression, you should____complete multiplication before division.A. SomtimesB. AlwaysC. Never Enter an equation in slope-intercept form for the line parallel to y = 4x - 1 containing (-3, 2). PLEASE IM BEGGING YOU HELP ME I NEED HELP PLEASE SHOW YOUR WORK ITS DUE SOONquestion: solve for the solution. Put these terms in order of hierarchical organization (smallest to largest):Population, cells, organ, organism, organ system, tissue and organelles Relationship A has a greater rate than Relationship B. This table represents Relationship B.Hours worked 2 4 5 8Amount paid 30.40 60.80 76 121.60Which equation could represent Relationship A?Hours worked is represented by x, and the amount paid is represented by y.Select each correct answer.Responsesy = 16.4xy = 15.2xy = 14.9xy = 15.4x Please help i will give brainlist . What are the numbers of symmetries for this figure?Enter your answers in the boxes.Number of rotational symmetries: __Number of lines of reflectional symmetry: __ If you were a parent, would you decide to give your child a smart watch as a way to reach them or track them, before letting them have a smartphone? Why, or why not? Evaluate the line integral S. (2 + x2y)ds, where C' is the upper half of the unit circle x2 + y2 = 1 . x2 + y2 = 1 (y=0) 0 -1 1 urgent.Allocative efficiency means Select one: a. the same thing as technical efficiency. b. that all firms in a competitive industry are producing the same amounts of output. c. is concerned with producing T/F. Benchmark firms have driven down costs of supply chain performace The results of a common standardized test used in psychology research is designed so that the population mean is 145 and the standard deviation is 50. A subject earns a score of 155. What is the z-score for this raw score Which two of these poetic passages use alliteration for effect ? I WILL MARK BRAINLIEST A big box store decreased the price of a computer from $399 to $349. What is the approximate percentage that the price of the computer was reduced?Responses35%12.5%25%14.3%Your science experiment has a percent error of 3%. The estimated weight of your rock sample is 47 grams.What is the actual weight of the rock sample? (Round your answer to the nearest tenth.)Responses48.4g or 45.6g44.4g or 41.4g44.2g or 50.4g50g or 44gA car's speedometer is reading 55 miles per hour. The percent of error is 5%. What is the actual speed of the car? Round your answer to the nearest mile per hour.Responses51 or 54 mph52 or 55 mph50 or 60 mph53 or 56 mph What credit utilization is best reddit? Can someone help me