________ means that IT capacity can be easily scaled up or down as needed,which essentially requires cloud computing. A) agility B) flexibility C) responsiveness D) IT consumerization

Answers

Answer 1

Answer:

The correct option is;

A) Agility

Explanation:

Business agility is a measure of the responsiveness of business to business opportunities that is the time lapse between the emergence of a business opportunity and the the business formerly responding to the opportunity.

By similar analogy, IT agility is about the responsiveness of an organizations IT infrastructure to external stimuli. As such IT agility measures the systems adaptability to change (which may involve scaling down) or how easily it is for the IT system to be able to produce new transferable opportunities which involves scaling up as needed.


Related Questions

Which of the following is not a networking equipment?

Answers

Answer:

[tex]\boxed{\sf (C) \ mouse}[/tex]

Explanation:

A networking equipment can share data along a computer network. A mouse is not a networking equipment.

How do I make my mobile number appears switched off to a specific number not with truecaller app...(vivo user)​

Answers

Answer:

Hello, there is no way you can make your mobile number appear switched off to a particular number unless you really switch it off.

However, you can set your phone to "Call Forwarding" on your Android device. What it would do is that when the person calls your number, he gets the message that you are unreachable.

Explanation:

Here's how to set Call Forwarding on your android

Open your phone dialerGo to your Phone Settings Click on Call SettingsSelect Call Forwarding (in some Androids, you'll have to select 'Calling Accounts' first)Select 'Always Forward', 'When Busy', 'When Unanswered' or 'When Unreachable'After selecting your preferred option, you can set the forwarding numberEnable the settings or click 'Ok'

convert (0.255)¹⁰ into binary

Answers

0.01000001010001111011

Must click thanks and mark brainliest

The attacker sent data that was able to manipulate the return address that is reserved to store expected data

Answers

Complete Question:

An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The attacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions?

Answer:

A buffer overflow.

Explanation:

In Computer science, a buffer can be defined as a temporary area set aside for data storage. Buffers reside in the random access memory (RAM).

In the event that, a system process or program places more data (much more than what was originally or initially intended to be allocated for data storage) in a buffer, the extra data overflows. Consequently, this would result in having some of the data to flow into other buffers and thus, causing the data to be overwritten or corruption of the data being held in that buffer.

For example, we can liken a buffer-overflow to pouring water (data) into a container (program memory), once it is filled the water begins to overflow as the container has reached its maximum amount.

In this scenario, the vulnerability exploit which resulted from the attacker's actions by manipulating the return address that is reserved to store an expected amount of data is referred to as a buffer overflow.

Website reputation is an important part of page quality (PQ) rating. Reputation can justify the Highest rating and the Lowest rating.

Answers

Answer:

The given statement is false.

Explanation:

A Website reputation seems to be a built-in feature or tool. It retains knowledge about users, through visiting pages. The committed resources for this site depending on either the website as well as the basic details about its design. The reputation including its Website has been used to strengthen the safety of phishing attacks or malicious content.

Therefore the solution given above is the right one.

Which of these is NOT an input device?
O keyboard
O mouse
O blinking light
O microphone

Answers

Blinking light is not one of the awansers

You are replacing the toner cartridge for an old laser printer. You are concerned that several internal components are reaching their maximum age based on the printer's page count, and you need to replace the parts. However, you also know that certain components are included with the toner cartridge. You do not want to replace any components that are included in the toner cartridge. Which components are normally included in the cartridge

Answers

Answer:

The answer is "It is the photosensitive drum, that is electrostatically charged by the toner".

Explanation:

The laser printer uses the drum, which is also called a selenium-sensitive metal roller bearing. Its electrical circuit, which is mostly on the container, has been placed mostly on the printing business but instead, with exception of text a laser scans the ride cymbal 's surface.

In traditional printers, its electromagnetic loading wheel placed in addition to a drum.It rotates a picture-sensitive rotating disc, which would carry an electrical force on its substrate and while in the dark.

Which of these are part of the CPU?
O peripheral
O HDMI cord
O core
O keyboard

Answers

Hiii I think the best option would be C. Core

pls help help me is good help me helping is very good

Answers

Answer:

-56 negative

Explanation:

15 points please help!!!!


David works at a company that provides financial solutions. He wants to create an interactive presentation for his company. Which interactive platforms can David use for this presentation?

David can use an interactive or a for his presentation.

Answers

Answer:

Powerpoint presentation

Explanation:

Powerpoint presentation is a part of Microsoft office that is established by Microsoft. PowerPoint. It is used to present the company visions, missions, key points in a short and in an attractive way by using the various designs, pictures, audio clips, etc

Here David wants to create an interactive presentation so he should use the powerpoint presentations so that he could present the company visions, objectives, etc

please help me with this this is Computer chapter Advanced HTML of class 8th​

Answers

Answer:

ok let me try

It stands for

Hypertext Markup Language

Image result for html stands for

HTML (the Hypertext Markup Language) and CSS (Cascading Style Sheets) are two of the core technologies for building Web pages. HTML provides the structure of the page, CSS the (visual and aural) layout, for a variety of devices.

Does anyone know what happened to Cole Morgen, the actor?

I looked on the internet about him and it turned out that he was 24 years old, but it is the only thing that appears about him.​

Answers

Answer:

Cole Morgen has been on stage acting in theatre and dance since the age of 4.He has been a part of many local theatre productions. His first professional play was "Dead End" starring Jeremy Sisto and directed by Nicholas Martin at the Ahmanson Theatre followed by and a part in the Arthur Miller's play "All My Sons" directed by Randall Arney at the famous Geffen Playhouse.

Cole was cast in his first feature film as Kevin James's son Eric in the current Adam Sandler film "I Now Pronounce You Chuck and Larry" directed by Dennis Dugan.Cole has an unlimited amount of enthusiasm that he brings to everything that he does. Not only is he a very talented and versatile actor and tap dancer, he is a kind and gentle soul. He has always carried a vision of giving back to his community in some way. On his birthday/holidays, instead of receiving gifts, he has managed to figure out a way to make a difference. In the past he has collected food for animal shelters, toys for children, and performed at retirement homes for fun. Cole loves music and plays the piano and guitar. Cole enjoys swimming, soccer, bike riding, sailing, chess,and origami. Cole is never without a book and credits his reading to strengthening his creative side and inspiring him to meet the challenge for future acting roles.Besides acting, Cole loves tap dancing and is always looking to improve his skills. He won the national tap competition last summer taking the title of Mr. Junior Cole has an unlimited amount of enthusiasm that he brings to everything that he does. Not only is he a very talented and versatile actor and tap dancer, he is a kind and gentle soul. He has always carried a vision of giving back to his community in some way. On his birthday/holidays, instead of receiving gifts, he has managed to figure out a way to make a difference. In the past he has collected food for animal shelters, toys for children, and performed at retirement homes for fun. Cole loves music and plays the piano and guitar. Cole enjoys swimming, soccer, bike riding, sailing, chess,and origami. Cole is never without a book and credits his reading to strengthening his creative side and inspiring him to meet the challenge for future acting roles.

Hackers often raise the trust level of a phishing message by modeling the email to look similar to the internal email used by the target company. This includes using logos, formatting, and names of the target company. The phishing message will often use the name of the company CEO, President, or Managers. The time a hacker spends performing research to locate this information about a company is known as

Answers

Answer:

Reconnaissance

Explanation:

Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that infects PGP software and sits quietly inside Alice's computer. When Alice uses her private key to decrypt a message, the virus would wake up and make a note of it. The next time that Alice connects to the Internet, the virus would surreptitiously send the private key to Eve, thereby allowing her to decipher all subsequent messages sent to Alice. One way to better connect with this excerpt is to

Answers

Answer:

Tell about an experience with a computer virus.

Explanation:

Simon Singh's "The Code Book," tells the history of how cryptography came into being and the secret messaging world of encryption. Through the detailed narration and diving into the history of encryption, the author traces the evolution of such a process and reveals how it has had a huge impact on the world's policies.

In the given excerpt, Singh gives an example of how viruses are planted and used to spy/ get access to other people's computers. But while it is possible to get the main point of the example, it would have been better if the writer includes experience with a computer virus so that readers will find it easier to connect with the given example. This will enable them to better understand the working of viruses and their effects.

Thus, the correct answer is the first option.

Answer:

b

Explanation:

if you want to refine your google search by date, which option should you use?

Answers

Answer:

If you want to refine your Google search results by date, you should use Advanced search.

Explanation:

Answer:

Advanced Search.

Explanation:

Just go down to settings at the bottom of google and choose advanced search and fill in the boxes so your search comes up more specific.

c) Explain GIGO briefly.​

Answers

Answer:

Is is also a computer science acronym that implies bad input will result in bad output. Requiring valid input also helps programs avoid errors that can cause crashes and other erratic behavior.

IT'S FORMULA IS GIGO: GARBAGE IN GARBAGE OUT...

HOPE IT'S HELPFUL FOR U!!

AND PLZ MARK ME AS BRAINLIEST IF U LIKE THIS ANSWER!!!!

All of the following are challenges presented by changing technology as it relates to the special events field EXCEPT: A. the ability to manage much of the coordination of an event from a smartphone B. the static nature of technology C. the need to continually master new software programs and applications D. the ease of facilitating events provided by technology

Answers

Answer:

The answer is "option C".

Explanation:

The change in technology can be characterized as that of an increase in the production feasible thru the innovations, new technologies, and dispersion procedures at a specified amount of production. This technology concerns the Excluding area of special events, even if it needs the new master software and applications continuously, and the wrong choices can be defined as follows:

In choice A, it is a part of event management that's why it is wrong. In choice B it is wrong because it is used in learning. In choice D, it is wrong because it is used to make progress.

All of the options given are challenges to technology except D. the ease of facilitating events provided by technology.

It should be noted that changing technology can be challenging. It can bring about the ability to manage much of the coordination of an event from a smartphone.

It also leads to the static nature of technology and the need to continually master new software programs and applications. The ease of facilitating events provided by technology isn't a challenge.

Learn more about technology on:

https://brainly.com/question/8184227

if your computer is gliching what do you do to stop it and some times it turnes off what do you do

Answers

Answer:

You can take it to the shop to fix it since it happens often ig

Explanation:

I Hope This Helps bro

what are the disadvantageous of emails

Answers

Answer:

it could lead to overload of information.. wastage information.it can cause misunderstanding and disabilities between both person.

Need internet connection.without it can't use.

it can be hacked.and also lack the personal touch..

Answer:

they can cause misunderstandings and people read with diffrent

moods

Explanation:

what are the means of hardware security?​

Answers

Answer:

Hardware security is vulnerability protection that comes in the form of a physical device rather than software that is installed on the hardware of a computer system. ... Common examples include hardware firewalls and proxy servers.

Explanation:

Thank you

Explanation:

Hardware security is vulnerability protection that comes in the form of a physical device rather than software that is installed on the hardware of a computer system. ... Common examples include hardware firewalls and proxy servers.

You are replacing a wired business network with an 802.11g wireless network. You currently use Active Directory on the company network as your directory service. The new wireless network has multiple wireless access points, and you want to use WPA2 on the network. What should you do to configure the wireless network

Answers

You are replacing a wired business network with an 802.11g wireless network. You currently use Active Directory on the company network as your directory service. The new wireless network will have multiple wireless access points. You want to use WPA2 on the network. What should you do to configure the wireless network?

(Select two).

a. Use shared secret authentication

b. CONFIGURE DEVICES TO RUN IN THE INFRASTRUCTURE MODE

c. Configure devices to run in ad hoc mode

d. Use open authentication with MAC address filtering

e.  INSTALL A RADIUS SERVER AND USE 802.1X authentication.

 

Carlos is using the software development life cycle to create a new app. He has finished coding and is ready to see the output it produces. Which stage of the software development life cycle is Carlos ready for next? Coding Design Maintenance Testing

Answers

Answer:

Testing

Explanation:

From the question, we understand that Carlos just finished the coding of the app.

In software development life cycle, the coding phase is where Carlos is expected to make use of his choice of programming language to design the app;

This stage is an integral part of the implementation process and according to the question, the coding has been completed;

The next phase or stage after the implementation phase is testing.

Hence, Carlos is getting ready to test the app.

Answer:

Testing                                   I took the test I definetly testing <3

What is the key function of a sales team?
A. to maintain customer-retailer interaction
B. to create appealing advertisements
C. to maintain fan–developer communication
D. to develop customer–fan relationships

Answers

Answer:

A. to maintain customer-retailer interaction

Explanation:

A sales team is a subdivision in a company that is dedicated to making sales for the company and they are responsible for meeting the growth goals of that company.

The key function of a sales team is to maintain a healthy customer-retailer relationship or interaction because it is from this good relationship that goods and services are sold.

You are an IT technician for a small computer store. You are designing a new gaming PC for a customer. You need to ensure that it provides the capabilities that will be needed by this type of PC. Which of the following should be a concern?

a. motherboard
b. CPU
c. graphics card
d. sound card

Answers

Answer:

all options

a, b and c the most important

Explanation:

can we draw a formula triangle for velocity?​

Answers

Answer:

Yes we can actually draw a formula triangle for velocity

Explanation:

I can't explain why but if u wanna calculate the velocity of something using a diagram then you will draw a trapezium and in that trapezium there are two triangles and a rectangle so you will split it into two triangles and trapezium so I think we can actually draw a formula triangle for velocity

array Write a recursive function stringReverse that takes a string and a starting subscript as arguments, prints the string backward and returns nothing. The function should stop processing and return when the end of the string is encountered. Note that like an array, the square brackets ( [ ] ) operator can be used to iterate through the characters in a string.

Answers

user_in = str ( input ("Please enter a phrase: " ))

def reverse_str (string):

e = 0

for e in range (len (string)):

x = -1

print string[x]

x += (len (string))

Felicity wants to capture the attention of the regular subway commuters in her area through her print advertisement. She wants to use a stationary print medium that commuters can see from a distance. Which print medium should Felicity choose?
(Correct answer only)

A. magazine
B. newspaper
C. flier
D. billboard
E. brochure

Answers

Answer:

D. billboard

Explanation:

Commuters can most likely see billboards from a distance.

The print medium to be chosen by the felicity should be Billboard. Thus, option (D) is correct.

What is billboard?

Billboard is a HORDING and huge outdoor advertisement board That can be seen by many people. In order to be seen by the most automobiles and pedestrians, billboards are frequently erected in busy places like highways and urban areas.

Many of the company publish their brands and products on the billboard for spreading brand awareness and spreading the word of their company  to as many people can know about the product.

According to the above scenario, Felicity can capture the attention of the regular subway commuters in her area through billboard advertisement. From a distance, commuters can see the advertisement.

Therefore, it can be print medium to be chosen by the felicity should be Billboard. Hence, option (D) is correct.

Learn more about Billboard here:

https://brainly.com/question/8494411

#SPJ2

Select each procedure that will keep the computer safe and working properly. the correct answers are A, D, E
i just took it!


Gently type on the keyboard.

Download software from the Internet without permission.

Turn the power off on the computer before shutting down.

Wash your hands thoroughly before using the computer.

Set your water bottle on a table that is away from hardware.
Select each procedure that will keep the computer safe and working properly.


Gently type on the keyboard.

Download software from the Internet without permission.

Turn the power off on the computer before shutting down.

Wash your hands thoroughly before using the computer.

Set your water bottle on a table that is away from hardware.

Answers

Answer

Wash your hands thoroughly before using the computer.

Gently type on the keyboard.

Set your water bottle on a table that is away from hardware.

Explanation:

Your company has decided to implement a wireless network. The wireless network users must be able to connect to resources on your internal network, including file, print, and DHCP services. Which options should you implement?

Answers

Options:

A Infrastructure mode

B Ad hoc mode

C a wireless access point

D static IP addresses

E APIPA

Answer:

A. Infrastructure mode

C. a wireless access point

Explanation: A DHCP is a server that makes use of s standard protocol called dynamic host configuration protocol to automatically assign internet protocol (IP) addresses and other computer parameters to clients. It gives them the opportunity to effectively make use of other network services such as DNS( domain name system) and NTP(network time protocol).

an interface are connection point with hardware devices are joined​

Answers

Answer:

Explanation:

Networking hardware is the correct answer

Other Questions
You are a policy analyst in the Department of Energy. You were just offered a job with a renewable energy company. How long must you wait before you can lobby the Department of Energy on behalf of your new employer? If the lateral surface area of a cube is 100 square inches, what is the length of an edge? Using the digits 0-9, at most only one time each, fill in the boxes to PLEASE HELP 46 POINTS!!! Find f-l.f(x) = 4log (x-7) Helena builds a shed in her backyard. There is a larger section for large tools, like her lawn mower, and a smaller section for small tools. What is the length of the entire shed? What type of number is the length? List as many types of numbers for the length as you can. FOR EASY BRAINLIEST ANSWER THESE QUESTIONS:1.2.3.4.5. Argument:More people need to pay attention to woman when it comes to sportsGive reasons why. You look over the songs in a jukebox and determine that you like of the songs. (a) What is the probability that you like the next four songs that are played? (Assume a song cannot be repeated.) (b) What is the probability that you do not like the any of the next four songs that are played? (Assume a song cannot be repeated.) (a) The probability that you like the next four songs that are played is nothing. (Round to three decimal places as needed.) (b) The probability that you do not like any of the next four songs that are played is nothing. (Round to three decimal places as needed.) A fireworks rocket is launched vertically upward at 40 m/s. At the peak of its trajectory, it explodes into two equal-mass fragments. One reaches the ground t1 = 2.71s after the explosion.When does the second reach the ground?t=? Discounted payback period. Given the following two projects and their cash flows, LOADING..., calculate the discounted payback period with a discount rate of %, %, and %. What do you notice about the payback period as the discount rate rises? Explain this relationship. With a discount rate of %, the cash outflow for project A is: Raul is a manager at a local restaurant. He earns $18.50 per hour. How many hours per week does Raulwork if he earns $740 per week? 5-53/2-11 rationalize All the following statements concerning requirements to reinstate a lapsed life insurance policy are correct EXCEPT: Group of answer choices The lapse must have resulted from other than the surrender of the policy for its cash value. There is no time limit on when the policy may be reinstated. Evidence of insurability is required. All overdue premiums must be paid along with interest from the premium due dates. In terms of communicative competency, effective leaders attempt to force their own ideas into group discussions.a. Trueb. False 1. What property could you use to show that triangles ACT and ODG are congruent? Lack of oxygen to the brain solve this it attached Place the 4 steps of biofilm formation, listed below, in the correct order. 1. Surface (substratum) is preconditioned by environmental molecules.2. Quorum sensing and the establishment of the extracellular matrix commences as microbes attach more stably.3. Biofilm matures and some microorganisms escape to the planktonic state.4. Microbes attach and detach from the preconditioned surface. ***50 POINTS*** Type out what is on the pictures.