which of the following is an example of a cloud​

Answers

Answer 1

Answer: An unknown network.

Explanation:

The options include:

a. An unknown network

b. Two computers that share information via a flash drive moved form one to the other

c. Five computers that share information through a router

An example of cloud is an unknown network.

The cloud simply refers to the servers which can be accessed over the Internet. It should be noted that the databases and the software that run the servers can be accessed over the internet as well

When cloud computing is used, the users and the companies dmtahtnare involved do not have access to the physical servers themselves as it's an unknown network.


Related Questions

WLAN is a network connected by cables. *
true or false

Answers

Answer:

are you girl

shslanshaknskaozbdksos

Answer:

true

Explanation:

it is wireless LAN network connected by cables

What is Inheritence in computer science? Explain in your won words with examples.

Answers

Answer:

Inheritance is when one class or script, inherits the properties and methods of another class. They can be re-used which makes it useful. This is why there are parent classes and child classes. Child classes inherit the properties of the parent class. An example is when a "car", "truck" are subclasses of a class called vehicle. Allowing you to make more vehicle using the same parent class.

Hope this makes sense!

HELP ASAP!!!!
I don't know the code to these images and I need that code now.

Answers

Answer:

Menu of turtle moves

Explanation:

The operating system that has a significantly lower cost is _____.


Mac

Linux

Windows

Answers

Answer:

Linux

Explanation:

It is free compared to the others.

100 POINTS. DO NOT SPAM. OR I WILL REPORT.
Write about various image degradation function.(minimum 5)​

Answers

Answer:

Explanation:

In digital image processing, degradation is a process of introducing defects to the image. Understanding the degradation function will allow restoration of the original image.

There are many different causes for image degradation such as motion blur, digital noise and lens off-focus. In cases like motion blur, it is possible to come up with an very good estimate of the actual blurring function and "undo" the blur to restore the original image. For digital noise, a statistical model can be set up to compensate for the degradation it caused.  Similarly  lens focus can be compensate by an optical model if the mis-focus is known.

The above are three degradations that I could find. A lot more information can be found about restoration functions. If you search for image degradation online, you will find a discussion on Quora and an interesting introduction from Rice University. Good luck!

Answer:

Explanation:

image degradation function helps 2 understand how a digital image has degraded n how 2 restore it

to come up w the function, start by observing the degraded image. look 4 areas w less degradation n use them as reference of the original

if equipment used 2 take the degraded image is available, try finding the exact conditions which produce the same degradation. dat will provide clues for restoration

if the degraded image can be scanned, it can be manipulated digitally w various pre-programmed functions n look 4 any improvement

one of the above should help in restoring the degraded image

convert the following decimal number into octal number-147​

Answers

Answer:

The answer for your question is 223

what's your opinion on sentrent (it's a Pokemon)​

Answers

Answer:

Amazing and cute

Explanation:

It's small strong has a really cool shiny version but only has a max CP of 698

all in all I quite like it because of it's special defence so yeah it's a decent pokemon

Which of the following are exclusively associated with copyright protection? (Select three.)

Right to reproduce small excerpts of a work

Right to apply for a patent


Right for anyone to display a work

Right to lend a work

Right to use a trademark

Right to make derivatives of a work

Right to reproduce a work

Answers

Answer:

Right to make derivatives of a work.

Right to reproduce a work.

Right to lend a work.

Explanation:

Just took the quiz on testout.

The rights which are exclusively associated with copyright protection are:

F. Right to make derivatives of a work. G. Right to reproduce a work. D. Right to lend a work.

Copyright protection has to do with an intellectual property law which makes it illegal for a person to copy the work of another, without approval, or adequate reference

As a result of this, we can see that the rights which are exclusively associated with copyright protection are the rights to make derivatives of a work, reproduce a work and to lend a work because they are the intellectual property of the author.

Therefore, the correct answers are options F, G, and D

Read more here:

https://brainly.com/question/23385572

state 5 different between mouse and keyboard​

Answers

Answer:

*here you go *

Explanation:

While the main purpose of a mouse is to guide the cursor on the computer monitor, a keyboard is a typewriter like device with some additional functions that allow human interaction with computer. ... While mouse is considered to be a pointing device, keyboard is the input device for a computer.

(Keyboard vs Mouse

Keyboard and mouse are integral parts of a computer system and one cannot even think of interacting with the computer or monitor with the use of these two devices. In a sense, these two devices are the user interface that allows working on a computer system, and without them it is not possible to do anything on a computer. While the main purpose of a mouse is to guide the cursor on the computer monitor, a keyboard is a typewriter like device with some additional functions that allow human interaction with computer. In fact, a keyboard is the only source of providing the input to the computer and it performs the functions we ask it only with the help of this device.

While mouse is considered to be a pointing device, keyboard is the input device for a computer. Despite touch screen having been developed that allows one to use virtual keyboard onscreen, physical keyboard remains first choice of most of the individuals. There are keys with symbols printed on them in a keyboard and with the lightest of touches; the numeral or alphabet gets written on the screen of the monitor using a keyboard. There are some instructions for which one has to press a key and holding it pressed, another key has to be pressed. There are many shortcuts also used with the help of a keyboard that help save time and effort. Many computer commands are the results of these shortcuts. The major function of a keyboard is when one is using a word processor or a text editor.

A mouse is a pointing device and consists of a right and left clicks with a wheel in between that allows on to scroll up and down on a web page. The major function of a mouse is to control the cursor on the monitor of the screen. Today there are wireless mouse available that work through infrared rays.)

what is considered an important ethical consideration when working with families

Answers

Ethical considerations
Informed consent.
Voluntary participation.
Do no harm.
Confidentiality.
Anonymity.
Only assess relevant components

What is the missing line of code?

>>> __________

>>> random.randrange(10)
5
>>> random.shuffle([1,3,6])

A. import random
B. from random import shuffle
C. from random import randrange

Answers

Answer:

B. from random import shuffle

Explanation:

Answer: A.

Explanation: Import random

lcons are normally displayed on​

Answers

home scream of a computer

BIG POINTS! BIG POINTS! BIG POINTS!
Does someone know how to fix a A s u s computer that won't turn on. Computer is all the way charged. Here is some screenshots of how it looks. Can this be an easy way to fix it because I can't really take out a battery or use tools. Thanks!

Answers

Try and hold the power button for a little while, and if it doesn't turn on then you might have to contact customer support.

Answer:

take the bottom of take out the battery and putt it back in

Explanation:

Why when i want to answer a profile that starts with a will put a link to "https://bitly.com/"

Answers

i don’t know i checked it and i think it’s a virus or something like that don’t click on link

Need answer ASAP. No links

Select the correct answer

Clara writes online articles based on world religions. Her articles have references to dates. Which HTML element will help her display dates (A.D. or B.C.) correctly on a web page?

Posted the answers on the picture since they don’t show up when I write them on here

Answers

Answer:

A <b>

Normally AD and BC are written in bold letters.

for example : The terms anno Domini (AD) and before Christ (BC).

Within available option the best option to choose is <b> hope it helped

Answer:

its d <small>

Explanation: A:D and B:C are displayed smaller then normal letters

Q)What software application is the most effective tool to create charts of data? *
a)Word Processing software
b)Spreadsheet software
c)Photo editing software
d)Desktop Publishing software

Answers

Answer:

b) spreadsheet software

Consider the following code segment, which is intended to display "cat".
String[][] keyboard = {{"q", "W", "e", "r", "t"},
{"a", "S", "d", "f", "g"},
{"z", "X", "C", "v", "b"}};
System.out.println(/* missing expression */);
Which of the following can replace /* missing expression */ so that the code segment works as intended?

Answers

Answer:

Explanation: can you include a picture?

Answer:

Replace missing expression with:

keyboard[2][2].toLowerCase()+keyboard[1][0]+keyboard[0][4]

Explanation:

Given

The above code segment

Required

Which code displays "Cat"

First, we need to identify the location of C, a and t in the array

[tex]C \to keyboard[2][2][/tex] i.e. C is at the 2nd row index and 2nd column index

[tex]a \to keyboard[1][0][/tex] i.e. a is at the 1st row index and 0 column index

[tex]t \to keyboard[0][4][/tex] i.e. t is at the 0 row index and 4th column index

Next convert C to lowercase.

This is done using: toLowerCase() method.

So, we have: keyboard[2][2].toLowerCase()

Next, we concatenate each of the above.

i.e. keyboard[2][2].toLowerCase()+keyboard[1][0]+keyboard[0][4]

Lastly, the statement is printed:

System.out.println(keyboard[2][2].toLowerCase()+keyboard[1][0]+keyboard[0][4]);

Pseudocode is an outline of your code that goes through the steps in human
language.
1) True
2) False

Answers

i think it’s true
hope this help

Convert the following denary numbers into binary using 8-bit register:

00000011

00000101

00010101

00111001

01001100

01000001

00101011

10010011

10101010

11111111

Answers

Answer:

1) 3

2) 5

3) 21

4) 57

5) 76

It would be much more easier if there were a grid containing all the numbers.

Susan uploads her newly created files on the web server using FTP. What should she ensure while uploading to prevent other users from modifying her web pages?
A.
check the file permissions
B.
uninstall the FTP client
C.
download new software
D.
delete default files
E.
create new credentials

Answers

Answer:

A, check file permissions

Explanation:

if you don't set proper file permissions people can modify the contents of what you have uploaded to the FTP server

Answer:

cHECK FILE permissions

Explanation:

draw a rose and sunflower using the turtle code

you can only use this four nothing else

funTurtle.forward
funTurtle.right
funTurtle.left
funTurtle.backward

Answers

Answer:

funTurtle.forward

Based on what you've learned about the main elements, themes, and conventions in
Gothic literature and based on the popular Gothic works that you've read and analyzed,
what does the Gothic genre mean to you? If you had to write a Gothic story, what are
the elements and themes you'd want to include and why?
Further your participation in the discussion by reading and responding to what others
post

Answers

Hey!

Answer:

Gothic literature is a genre that emerged as one of the eeriest forms of Dark Romanticism in the late 1700s, a literary genre that emerged as a part of the larger Romanticism movement. Dark Romanticism is characterized by expressions of terror, gruesome narratives, supernatural elements, and dark, picturesque scenery. Gothic fiction, sometimes called Gothic horror in the 20th century, is a genre of literature and film that covers horror, death and at times romance. It is said to derive from the English author Horace Walpole's 1764 novel The Castle of Otranto, later subtitled "A Gothic Story".

Gothic elements include the following:

Setting in a castle An atmosphere of mystery and suspense An ancient prophecy is connected with the castle or its inhabitants (either former or present) Omens, portents, visions Supernatural or otherwise inexplicable events High, even overwrought emotion Women in distress etc.

This genre is dark, eerie, and mysterious, often containing elements of terror, horror, and the macabre and the bizarre. Common themes and motifs of the Gothic include power, confinement, and isolation.

Hope it helps :)

Have a great day!

1. Pasar los siguientes ejercicios a diagrama de bloque

Ejercicios:
a) Un editor puede corregir 184 páginas de un libro en 8 horas de trabajo. ¿Cuántas páginas puede corregir los sábados que trabaja únicamente 5 horas?

b) Si 14 lápices cuestan $42 ¿Cuánto cuesta un lápiz y cuánto me costará comprar 25 lápices?


2. Pasar los Diagrama de Bloques obtenidos a Pseudocodigos

Answers

Answer:

A) Los sábados el editor puede corregir 115 páginas.

B) Cada lápiz cuesta $3 y 25 lápices cuestan $75.

Explanation:

A) Dado que un editor puede corregir 184 páginas de un libro en 8 horas de trabajo, para determinar cuántas páginas puede corregir los sábados que trabaja únicamente 5 horas se debe realizar el siguiente cálculo:

184 / 8 x 5 = X

23 x 5 = X

115 = X

Por lo tanto, los sábados el editor puede corregir 115 páginas.

B) Dado que 14 lápices cuestan $42, para saber cuánto cuesta un lápiz y cuánto me costará comprar 25 lápices se deben realizar los siguientes cálculos:

42 / 14 = X

3 = X

3 x 25 = 75

Por lo tanto, cada lápiz cuesta $3 y 25 lápices cuestan $75.

Select the correct answer.
Lionel writes for his personal blog. He would like to know how many users visit his blog. Which tool will help him to know the number of users visiting his blog?
A.
Microsoft Word
B.
Antiword
C.
StatsCounter
D.
pdftohtml
E.
Cron

Answers

The answer is B I did the test

Answer:

Antiword is your answer

Explanation:

WHO SAYS BUP ALL THE TIME ​

Answers

Answer:

Mario

Explanation:

BRAINLY!! What’s the significance of the world wide web and how has it affected us. Please try to answer this in 3+ sentences :3

Answers

Answer: Read Below (fixing spelling errors)

Explanation: The world wide web is helpful/significant to use since it not only helps us communicate but helps us explore new things such as hobbies. Having access to the internet and the web can affect us in a good way, we can do research and allow others to see and share our work. It can almost create a bonding experiement. It has truly helped us!

I hope this helps I will fix spelling mistakes and others! <3

What is the first step in changing where templates are stored?
Click the At startup, open all files in box.
Double-click on the Advanced option.
Open the Excel Options dialog box.
Enter the folder path to use for templates.

Answers

Answer:

Open the Excel Options dialog box

Explanation: edg

how does a demilitarized zone (dmz) work. A.By preventing a private network from sending malicious traffic to external networks B.by monitoring traffic on a private network to protect it from malicious traffic. C. by interacting directly with external networks to protect. D. by interacting with a private network to ensure proper functioning of a firewall E.by monitoring traffic on external networks to prevent malicious traffic from reaching a private network

Answers

Answer:

C. by interacting directly with external networks to protect a private network.

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Phishing is an attempt to obtain sensitive information such as usernames, passwords and credit card details or bank account details by disguising oneself as a trustworthy entity in an electronic communication usually over the internet.

Phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

In order to prevent a cyber attack on a private network, users make use of demilitarized zone (DMZ) depending on the situation.

A demilitarized zone (DMZ) work by interacting directly with external networks to protect a private network.

Int a = 1; int b = 0; int c = -1; if ((b + 1) == a) { b++; c += b; } if (c == a) { a--; b = 4; }

Answers

Answer:

[tex]a = 1[/tex]

[tex]b = 1[/tex]

[tex]c = 0[/tex]

Explanation:

Given

The above code segment

Required

The final values of [tex]a,\ b\ \&\ c[/tex]

The following line declares and initializes the values of a, b and c

int a = 1;     int b = 0;     int c = -1;

So, we have:

[tex]a = 1; b =0; c = -1[/tex]

Next, the following if condition is tested

if ((b + 1) == a)

[tex]b + 1 =0 +1[/tex]

[tex]b + 1 = 1[/tex]

And:

[tex]a = 1[/tex]

So,

[tex]b + 1 = a = 1[/tex]

Since the condition is true, the statements in the curly brace { } will be executed;

[tex]b++ \to b = b+1 \to b = 0 + 1 \to b = 1[/tex]

So:

[tex]b = 1[/tex]

[tex]c += b \to c = c+b \to c = -1 + 1 \to c = 0[/tex]

So:

[tex]c = 0[/tex]

Next, the following if condition is tested

c == a

c = 0 and a =1

So:

[tex]c \ne a[/tex]

That means, the statements in its curly brace will not be executed.

So, the final values of a, b and c are:

[tex]a = 1[/tex]

[tex]b = 1[/tex]

[tex]c = 0[/tex]

A five-paragraph essay question is one of the three types of response questions.
Please select the best answer from the choices provided
OT
OF

Answers

Answer: False

Explanation:

It should be noted that the fill in the blank questions are being regarded as the response questions. The three types of response question include the quick time response, lag time response and the no response.

When the individual knows the answer immediately after reading a particular question, it's regarded as quick time response while it is lag time when one doesn't know it immediately.

It should be noted that the five-paragraph essay question is not one of the three types of response questions. Therefore, the answer is false.

Other Questions
PLEASE HELP ME!What does this excerpt from A Christmas Carol by Charles Dickens reveal about Ebenezer Scrooge? It opened; and a little girl, much younger than the boy, came darting in, and putting her arms about his neck, and often kissing him, addressed him as her "Dear, dear brother.""I have come to bring you home, dear brother!" said the child, clapping her tiny hands, and bending down to laugh. "To bring you home, home, home!""Home, little Fan?" returned the boy."Yes!" said the child, brimful of glee. "Home, for good and all. Home, for ever and ever. Father is so much kinder than he used to be, that homes like Heaven! He spoke so gently to me one dear night when I was going to bed, that I was not afraid to ask him once more if you might come home; and he said Yes, you should; and sent me in a coach to bring you. And youre to be a man!" said the child, opening her eyes, "and are never to come back here; but first, were to be together all the Christmas long, and have the merriest time in all the world."A. He used to have some strong sense of belonging in his family.B. He resents his sister's closer relationship with their father.C. He was sad to leave his boarding school to go home with Fan.D. He believes that he became a miser because he left the school. Recently because of the coronavirus, many prisoners are being released. In your own words, discuss this controversial issue. Should have many of the pretrial detainees been among those considered for release? Why or Why not? I NEED HELP ASAP!!!!!!!!!!!!!!!!!!!! In the context of American expansionism, paternalism refers to which of the following? Design a poster showing the definitions of a translations, reflection, rotation, and symmetry. Include the word (with your own word), and draw picture to show of the transformation the coordinate plan showing all the lines of symmetry for your picture How can we take action and get involved in poverty? The Supreme Court's decision in United States v. Nixon resulted in Nixon's A. ImpeachmentB. ResignationC. Appeal of the decisionD. Second term as president In 150 to 200 words, assess the American military response to radical Islamic terrorists since 2000. Be certain to note if and how it has changed and explain why. Irene has made Sara an offer on the purchase of a capital asset. Irene will pay (1) $200,000 cash or (2) $50,000 cash and a 6% installment note for $150,000 guaranteed by City Bank of New York. If Sara sells for $200,000 cash, she will invest the after-tax proceeds in certificates of deposit yielding 6% interest. Saras cost of the asset is $25,000. Why would Sara prefer the installment sale? Splish Company purchased a computer for $9,920 on January 1, 2019. Straight-line depreciation is used, based on a 5-year life and a $1,240 salvage value. On January 1, 2021, the estimates are revised. Splish now feels the computer will be used until December 31, 2022, when it can be sold for $620. Compute the 2021 depreciation. (Round answer to 0 decimal places, e.g. 45,892.) Depreciation expense, 2021 g Please help? ill give 38 points. What is the pH of a solution that has a [OH^-] of 1x10^-2?21298 The cotton gin and the sewing machine both contributed to the growth of which industry?A. SteelB. TextileC. TransportationD. Food processing g The liquidity trap refers to the situation where Multiple Choice the Fed adds excess reserves to the banking system, but it has minimal positive effect on lending, investment, or aggregate demand. excessive consumer debt limits the growth in consumer spending necessary to bring the economy out of recession. the public debt is so large that federal borrowing drives up interest rates and discourages private sector spending. a financial crisis causes a run on banks and the elimination of billions in excess reserves. Which of the following contributes to the diversity of an ecosystem? Increased keystone speciesReduced species richnessIncreased invasive speciesIncreased foundation species PLEASE HELP WILL GIVE BRAINLIEST AND 40 POINTS!!!! ZgotDripxxWhat's up? what are different perspectives on the issue about water consumption 8 kmb17 kmWhat is the length of the missing leg? PLEASE HELP!!!AOC~BOD. Identify the coordinates of D and the scale factor.A.) D (0, 7 1/12); 2/5B.) D (0, 1 1/5); 5/2C.) D (0, 7 1/2); 5/2D.) D (0, 1 1/5); 2/5