PLEASE HELP Due Today

Match the term with one of its characteristics.

1. Automation software that enables servers to be provisioned automatically or with a few clicks of a mouse.

2. Log managers read your system logs and look for patterns and make reports.

3. Created an elastic infrastructure that expanded and contracted as demand changed.

cloud

maintain security

data center​

Answers

Answer 1

The matchup are:

1. Created an elastic infrastructure that expanded and contracted as demand changed -cloud2. Log managers read your system logs and look for patterns and make reports.- Maintain security 3. Automation software that enables servers to be provisioned automatically or with a few clicks of a mouse-data center​

What is the software  about?

The  Cloud computing is one that gives a form of elastic infrastructure that gives room for on-demand allocation as well as deallocation of resources.

Lastly  Log managers are known to be computer tools that tends to read system logs as well as look for patterns in the data to see security threats.

Learn more about software   from

https://brainly.com/question/28224061

#SPJ1


Related Questions

A Uniform Resource Locator (URL) consists of 2 (Two) Basic Parts named ___________ and _________ separated by a colon (:) and 2 (two) forward slashes. *

A)a Protocol Identifier
B)a URL
C)a Resource Name
D)a Domain Name

Answers

Answer:

Protocol identifier A & URL B

Explanation:

Write code which takes inputs and creates two Rectangle objects (using the edhesive.shapes.Rectangle class) and compares them using the equals method.

JAVA!!

Answers

Answer:

System.out.println("Enter length:");

Scanner scan = new Scanner(System.in);

Double x = scan.nextDouble();

System.out.println("Enter 2 lengths:");

Double a = scan.nextDouble();

Double b = scan.nextDouble();

Rectangle rect = new Rectangle(x);

Rectangle rect2 = new Rectangle (a,b);

if (rect2.equals(rect)){

 System.out.print("Congruent Rectangles");

}

else {

 System.out.print("Different Rectangles");

}

 }

}

Explanation:

Which term means an unsecure protocol used when remotely accessing a computer?

Transmission Control Protocol (TCP)
Secure Shell (SSH)
Telnet
Internet Protocol (IP)

Answers

Answer:

9Internet Protocol (IP)

Answer:

The answer is Secure Shell (SSH)

PLEZ ANSWER QUICK
Another name for a web page's address is _____.

ISP

web server

HTTP

URL

Answers

The answer is URL. ........

Answer:

URL is the other name for a web page's address

The total mass for the substances after any
reaction change from its original.​

Answers

Answer:

If this is a T or F the answer would be TRUE

Explanation:

May I have brainliest please? :)

Answer:

No, the total mass of the substance doesn't change from it's original after any reaction

Explanation:

Due to Law of Conservation of Mass

A + B = AB

ex :- C (12) + O2 (16×2) = CO2 (44)

what format can be applied to text in excel?

Answers

You can apply accounting format,date,numbers, currency, percentage or even fraction

Fill in the blanks.
1.
Cloud offers the services to a limited and well-defined number of parties.
model.
2. Cloud computing services are based on a
3.
provides a cloud platform and allows developers to create, test, and ru
their program, website, web app, etc.
4. In
, you can keep files, folders, backups and everything important, online
5. Whenever you delete any file, it goes into
folder​

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This question is about to fill-in-the-blanks. To correct answer to each sub-question is given below:

1.

Cloud offers services to a limited and well-defined number of parties.  It is a Private model.

2.

Cloud computing services are based on software as a service (SaaS), infrastructure-as-a-service (IaaS), and platform-as-a-service (PaaS).

3.

Google provides a cloud platform and allows developers to create, test, and ru n their program, website, web app, etc

It is also noted other cloud platforms such as Amazon cloud services, Microsoft Azure cloud services provide such functionalities.

4.

In  Cloud backup storage, you can keep files, folders, backups, and everything important, online

5.

Whenever you delete any file, it goes into  Recycle Bin (if you are using windows) or trash (if you are using MAC) folder​

where to buy a ps5
I really want one please help meh

Answers

Answer:

You can buy one at gamestop, target, walmart, best buy and probably more stores

Answer:

Amazon, walmart, target, gamestop?

Explanation:

I'm sure a quick go ogle search will get u what u want to see, have a nice day and I hope u get what u want!

Create a for-loop which simplifies the following code segment: penUp(); moveTo(100,120); turnTo(180); penDown(); moveForward(25); penUp(); moveTo(100,120); turnTo(180); penDown(); moveForward(25); penUp(); moveTo(100,120); turnTo(180); penDown(); moveForward(25);

Answers

Answer:

for(var i=0; i<3; i++) {

  penUp();

  moveTo(100,120);

  turnTo(180);

  penDown();

  moveForward(25);

}

Explanation:

The i variable is the loop dummy. The code block will be executed 3 times.

Why can it be helpful to perform mathematical calculations using programming? Choose the best answer.

Answers

Answer:

The answer is below

Explanation:

Given that there is no available option.

Hence, It can be helpful to perform mathematical calculations using programming because

1. Programming is more viable and efficient in solving mathematical problems.

2. It is faster in getting an answer and easier to manipulate

3. It can be cheaper than human and be most time readily available

4. It can save and quickly recalls a memory

What will be displayed on the next line after you type the code below in IDLE and press ENTER?
>>>print(1 + 5)

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is given below:

This is a python code when you will write it into IDLE and press enter.

It will print six as a digit on the screen such as below:

>>>print(1 + 5)

6

Because, when you will give two integer parameters and a "+" operator, then the print function will add the two-parameter and print the result of the sum (5 and 1) on screen. So this code will print 6 as a result of this code on the screen.

Which of the following ideas would not be appropriate for an essay
comparing two dog breeds?
A. Terriers are feisty and smart, which can cause headaches for their
owners.
B. My dog Sally would play fetch for hours.
C. With a couple of exceptions, terriers are smaller than retrievers.
O D. Broadly speaking, retrievers are docile and friendly.

Answers

Answer:

B.

Explanation:

The following ideas would not be appropriate for an essay comparing two dog breeds:  My dog Sally would play fetch for hours. Thus option (B) is correct.

What is an essay?

An essay is defined as a brief formal piece of writing and an essay deals with a particular subject. It is generally written to try to influence the reader using selected research evidence.

In general, an academic essay has three parts:

An introduction part ,that provides the reader an idea of what they are about to learn and presents an argument in the form of a thesis statement

A body part, or middle section, that provides evidence used to prove and persuade the reader to accept the writer's particular point of view

A conclusion that summarizes the content and findings of the essay.

The following ideas would not be appropriate for an essay comparing two dog breeds:  My dog Sally would play fetch for hours. Therefore, option (B) is correct

Learn more about an essay here:

https://brainly.com/question/20426054

#SPJ5

Which of the following is NOT an example of application software?
Internet Explorer web browser
Photoshop image editing program
Microsoft PowerPoint presentation software
Windows operating system

Answers

Application software is a type of software that also carries out another personal, educational, and business function, and its further discussion can be defined as follows:

Each application is designed to support the user in a particular process that could be associated with productivity, creativity, and communication.In this question except for Windows all "web browser,  Photoshop, and presentation software" is a type of Application software, that is run on OS.  Windows is a software accumulation known as just an OS that controls a PC (personal computer).

Therefore, the final answer is "Windows operating system ".

Learn more:

brainly.com/question/2949220

What is the output of the following code:
lang=
['Python','C','C++, JAVA,ASP'PHP',VB', Oracle
'MySQL)
list1 = lang(2:-2]
list2 = langl-2:-5)
list3 = langl: : 3]
print(list)
print(list)
print(list3)​

Answers

Answer:

Syntax error.

Explanation:

There are many typing mistakes in this source code.

Icon view, list view, and details view are all common views provided by which kind of program?
a web browser to view web pages
a word processor to view headings
a file browser to view folders
a file manager to view files and folders

Answers

Answer: The standard program that uses common views such as the icon view, list view, and details view would be the program known as "File Explorer" (Windows) or "Finder" (Mac). This program uses all the views to make selecting and tracking down certain files a much more painless and easier process to complete.

Explanation:

boom : )

Answer: Maybe C

Explanation:

Write the count below the rests.

How do I do I do this?
Help guys

Answers

Well 1234 for the first one

True or false, USBs are slower than RAM.

Answers

Answer:

False

Explanation:

On the order form worksheet, unlock cells B5 through K5? On Microsoft excel

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The following steps can be used to unlock the cells of the Microsoft Excel worksheet.

Select the cells B5 through K5, that you want to unlock. Then choose the “Home” tab from the tab ribbon. In the “Cells” area, then select “Format” > “Format Cells“. Select the “Protection” tab. Uncheck the box for “Locked” to unlock the cells. Check the box to lock them. Select “OK“.

Where should citations be included in your research paper? Select all that apply.

In the header

At the end of every paragraph

As footnotes

In a separate Works Cited page

(EASY!!! BUT I NEED HELP PLEAASE!!!)

Answers

Answer:

in a separate works cited page

what is media ethics. Explain two forms of maintaining media ethics with examples​

Answers

Media ethics is the best division of applied ethics dealing with the specific ethical principles and standards of media, including broadcast media, film, theatre, the arts, print media and the internet. The field covers many varied and highly controversial topics, ranging from war journalism to Benetton ad campaigns. In relation to news coverage it includes issues such as impartiality, objectivity, balance, bias, privacy, and the public interest. More generally, it also includes stereotyping, taste and decency, obscenity, freedom of speech, advertising practices such as product placement, and legal issues such as defamation.

Question: 1
A special kind of firmware that runs programs strictly to start up the computer is called the:
motherboard
BIOS
CPU
GPU

Answers

Answer:

BIOS, it is the only type of firmware that is there.

What is the purpose of the Print Area feature?

printing graphs and charts for the document
printing how many copies of a document should print
selecting specific cells and ranges to print
selecting color for the Print Area’s border

Answers

Explanation:

printing how many copies of a document should print

Answer:

C. selecting specific cells and ranges to print

. Write a Python command to assign the value 80.35 to a variable called 'point'.

Answers

Answer:

point=80.35

Explanation:

Complete the sentence.
A _______ error might appear when you are attempting to view a secure web page

Answers

Answer:

An internal server error

Why can't I access my micro SD card on my Lenovo ThinkPad Yoga 11e? I'm trying to export some PNG files onto my Micro SD card, so I can have the files on my phones.

Answers

maybe you need a new sd card

Explain three causes of repetitive stress injuries (RSI)​

Answers

RSI can occur when you do repetitive movements. Those movements can cause your muscles and tendons to become damaged over time.

Some activities that can increase your risk for RSI are:

● stressing the same muscles through repetition

● maintaining the same posture for long periods of time

● maintaining an abnormal posture for an extended period of time, such as holding your arms over your head

● lifting heavy objects

● being in poor physical condition or not exercising enough

Hi, I couldn't delete my questions so I'm just editing them so you don't have to do it.

Answers

Ok that got h in by going go off do us do

Formulas should follow the___
last cell used
signs
order of operations
call of operations

Answers

Answer:

Order of operations

Explanation:

What keyword can we use within a form to pass it as an argument to a JavaScript snippet? A. form B. onSubmit C. send D. this

Answers

Answer:

the answer is: this

Explanation:

trust me

How do information systems help organizations?

Answers

Answer:

Information systems assist in disseminating information by allowing managers and other organization leaders to store data in folders and documents that can be seamlessly shared with the appropriate employees.

Explanation:

Other Questions
What is the best explanation for why governments collect taxes?*to fund services and programs*to fund elections for legislators*to fund private scholarships*to fund job-granted healthcare What is the domain of the relation? Write a recursive function called sum_values that takes in a list of integers and an index of one element in the list and returns the sum of all values/elements in the list starting with the element with the provided index and ending with the last element in the list. BRAINLIEST AND 100 POINTS BRAINLIEST TO THE FIRST CORRECT ANSWER!-4x6/7x-5/3 put your answer in simpliest form what negative impacts can take place in child's psychologywhen schools are politicized? ****20 point****attachment down below what is the remedy juliet proposes at the end of act 3? Colleges often rely heavily on raising money for an "annual fund" to support operations. Alumni are typically solicited for donations to the annual fund. Studies suggest that the graduates annual income is a good predictor of the amount of money he or she would be willing to donate, and there is a reasonably strong, positive, linear relationship between these variables. In the studies described: Solve the following equation for x. x = -2 x = 2 x = -17 x = -7 (x - 5)/2 = -6 Vhich is an issue that governments must consider before passing conservation policies? The Roman Constitution called for the government to be made up of the senate, the legislative assemblies, and the executive magistrates. This is an example of Eva bought 9 hanging baskets and 9 Petunias for her flower garden. Each hanging basket cost $5.48 and each Petunia cost $18.50. Eva has $250 to spend on items for her garden. How much money will Eva have left after her purchases? Why did the Kingdom of Kush move its capital from Napata to Mero? Kari makes headbands as gifts for her friends. In the past year, she has made 5 printed headbands for every 4 solid-colored headbands.If Kari has made 20 solid-colored headbands in the past year, how many headbands has she made in all? In terms of gene, chromosome, and DNA were put in order of size. what would be the order from smallest to biggest? Write a code for function main, that does the following: creates a variable and assign it the value True. uses a while loop which runs as long as the variable of the previous step is True, inside the while loop, get three integer numbers n1, n2 and n3 from the user and "Just look at the graph," the player's agent said. "Phil's hits have doubled since last year. We are looking for a large raise and a long contract." Look at the graph. A bar graph titled Phil's hits has this year and last year on the x-axis, and number on the y-axis, from 100 to 200 in increments of 20. This year is 180, and last year is 120. How can you redraw this graph so it appears that Phil's hits have quadrupled since last year. a. Use the same scale and make the top bar twice as thick as the bottom bar. b. Alter the scale so the top bar appears four times as long as the bottom bar. c. Both a and b. d. Neither a or b. A particle moves along a straight line with the equation of motion s = t^{5} - 2 t^{4} Find the value of t (other than 0 ) at which the acceleration is equal to zero. Read the following sentence.The city mayors corrupt policies soon attracted the attention of the local citizens.Which word should replace corrupt to create a sentence with a positive connotation?honorabledishonestpublishedshortened Tommy bought a total of 30 apples and oranges for a classic picnic. Apple's cost $3 per pound and oranges cost $4 per pound. Tommy spent $100 total. How many apples and oranges did Tommy buy?Please show work and explain