James wishes to access a certain software service via different computing systems over the Internet. What technology provides software on demand over the Internet?

Answers

Answer 1
Cloud Computing?
Hope I helped.

Answer 2

Cloud computing is the technology that will enable James to access a certain software service over Internet and provide software on demand.

Cloud computing delivers shared pool of configurable computing resources and allows customers to acquire resources at any time and then delete them the instant they are no longer needed. This technology besides the fact that it provides on-demand self-service , it encompasses the characteristics of grid computing  and the characteristics of utility computing.


Related Questions

A query is a request for the database management software to search for data that matches specific criteria.
a. True
b. False

Answers

True. Hope this helps you my dude

What type of engine is common on boats designed for shallow water?

Answers

Jet drives is engine that is common on boats designed for shallow water. 
Boats can have inboard or outboard jet drives.The jet drive draws the water from under the boat through an intake and into a pump-jet inside the boat. The difference between the jet boat and the powerboats or motorboats is that powerboats and motorboats have use an external propeller, while the jet boat draws the water from under the boat  

The set of communications rules for exchanging information electronically on the internet is called the ________.

Answers

The set of communications rules for exchanging information electronically on the internet is called the URL. URL stands for Uniform Resource Locator. It consists of Protocol identifier that indicates the name of the protocol that is used (for example: http) and  Resource name is the complete address to the resource. brainly.com.

In an ipv4 address, what are the maximum number of bits that can be used to identify the network address

Answers

Up to 24 bits can be used to identify unique networks.

Pan-os 7.0 introduced a new security profile type. what is the name of this new security profile type?

Answers

The name of the new security profile type is WILDFIRE ANALYSIS. Wildfire analysis is a cloud based threat analysis service that prevent threats, it can detects even the most evasive threat. Wildfire analysis report allows one to identify the source of a malware and determine the type of malware it is in order to take appropriate actions.

A(n) ____ window is an open window hidden from view but that can be displayed quickly by clicking the window's app button on the taskbar.â

Answers

A minimized window :)  

Hope that helped!

Answer:

The correct answer is: minimized.

Explanation:

When a window is active (the corresponding button is selected in the taskbar), clicking on its button in the taskbar minimizes the window. This means that the window disappears from the desktop. When a window is minimized, its content is not closed or deleted, it is simply temporarily removed from the desktop. In the previous image; are minimized, Excel and Windows Media Player but are still running, as their respective buttons appear in the taskbar. You can also minimize a window by clicking the Minimize button located in the upper right corner of the window.

To restore a minimized window - that is, to display it again on the desktop - click its button on the taskbar. For more information about these buttons, see Windows help and support.

Name two properties that a button object can possess?

Answers

A button object in a computer should have at least these two properties:
1. It should acknowledge a mouse click or key press.
2. It should trigger a functional code within the software to perform a specific task.

To perform its intended function properly, it is necessary for the button to have a title that clearly describes the function that it performs.

For example, the button could define a new color that is to be assigned to a graphics object or to a font.
Once the button is pressed, the button should trigger execution of code that actually implements the change in color.

Which feature in word automatically corrects typos, minor spelling errors, and capitalization as you type? autocomplete spelling and grammar autocorrect autotype?

Answers

I think auto correct.....,

Search engines that search other search engines are called

Answers

Answer: Metasearch engines

Answer:

Explanation:Um Search engines I'm playing metasearchengines

Although this technology-based practice can be helpful in some contexts, experts conclude that if students use it before using a search engine, it can significantly degrade the effectiveness of the search.

Answers

Machine translation is the technology-based practice can be helpful in some contexts. It is a software used to translate text or speech from one language to another. Although, experts conclude that if students use it before using a search engine, it can significantly degrade the effectiveness of the search. Some of the disadvantages of the machine translation are that it has low and inconsistent accuracy, it is unable to translate according the context and is non-formal.

Which adapter card in a pc would provide data fault tolerance?

Answers

The adapter cards add extra functionality to a computer and are designed for a specific task. There are several typed of adapter cards: Input/Output cards, Storage Controllers, Sound Cards,Graphic cards,...
A RAID (Redundant Array of Independent Diskscard) (or RAID controller) is an adapter card in a PC that provides data fault tolerance. It controls the expansion of internal and external drives so they can work as a single logical unit and provides fault tolerance for storage devices

what feature of excel allows you to automatically calculate common formulas which select data

Answers

See attached word doc Autosum

____ are diagrams used in mathematics and logic to help describe the truth of an entire expression based on the truth of its parts.

Answers

Truth tables are diagrams used in mathematics and logic to help describe the truth of an entire expression based on the truth of its parts.

A truth table shows all the possible combinations (outputs) that can be produced from the given inputs. They are mainly used in Boolean algebra.

"the ____ bar contains five buttons used to accomplish various tasks on the computer related to organizing and managing the contents of the open window."

Answers

The COMMAND bar contains five buttons used to accomplish various tasks on the computer related to organizing and managing the contents of the open window.

What folder is used to store offline files and folders managed by the offline files utility?

Answers

Offline files are stored in [systemdrive]:\windows\csc folder by default

What is the important safety information found on a boat's capacity plate?

Answers

Written on the boat capacity plate that is important for every captain or owner must be knowledgeable about is the maximum allowable total weight and number of passengers. This is to avoid untoward accident due to over capacity and a ticket for unsafe operation by law enforcements. 

How do you know when a spreadsheet object is active in a Word document?      A. The Ribbon is minimized. B. The Excel Formula bar is displayed. C. The Word icon in the taskbar is selected. D. The Office Clipboard task pane is open.  

Answers

You will know when a spreadsheet object is active in a Word document the Word icon in the taskbar is selected. The ribbon of Word will provide you with the Microsoft Excel features to be used for editing. These include charts, conditional formatting, and formulas.

Answer:

B The Excel Formula bar is displayed

Explanation:

To know if the spreadsheet is active in a word document, the excel formular bar is displayed. when you are done click outside of the spreadsheet and word is resumed or click inside the spreadsheet to resume editing the spreadsheet. This feature allows one to be able to create a spreadsheet in a word document, useful in creating business reprts.

The ____ keyword specifies that a function or method does not return a value.

Answers

The void keyword. Otherwise you use a type name, such as int or char or string.

You observe a small plaque on an electrical appliance that reads, in part, "115 volts AC 60 Hz." This means that the appliance A. contains a heating element. B. may be operated with batteries. C. produces special safety hazards. D. must be operated on alternating current.

Answers

You observe a small plaque on an electrical appliance that reads, in part, "115 volts AC 60 Hz." AC stands for alternating current. This means that the appliance must be operated on alternating current. Electrical appliance based upon their power consumption can be supplied on direct current (DC) or alternating current (AC).  In this case, the appliance must be supplied on AC current.

Why isn't 802.1X a good choice for home based wireless networks

Answers

It can possibly cause an issue with the authenticator's end. Its capacity has a limited memory capacity and has the minimal processing power. Most of the process will be at the supplicant and authentication servers. However, the 802.1X has a better security compared to the WEP.

In an ip address such as 72.44.192.233, the last number in the address (on the far right) identifies:

Answers

Answer: The hosts IP address

The general term for an object that receives notifications of user actions is

Answers

The general term for an object that receives notifications of user actions is an ActionListener, when a user performs an action on a control somewhere in the UI an ActionEvent object is created to represent the event, depending on whether the there are ActionListeners attached or not a notification will be sent to the attached ActionListener that in turn must provide an actionPerformed method that is required by the ActionListener interface.
The general term for an object that receives notifications of user actions is ActionListener. The ActionListener is an event handler interface, that receives action events. It is used in order to define the actions that should be taken when an user performs certain operation.For example when the 
user clicks a button the ActionListener receives messages from the ActionPerformed.

LOOK TO THE LEFT AND RIGHT BEFORE ENTERING ANY INTERSECTION ON A GREEN LIGHT BECAUSE:

A. Other vehicles might enter the intersection against a red lightB. Once you are in the intersection, you must only look straight aheadC. Cross traffic may have a green arrowD. Pedestrians on the cross street have the right-of-way

Answers

The answer is A. D could be true, but if you have green, they would have a red hand, and not right-of-way

Which one of the following may be used as an input as well as an output device? A. Fax machine B. Scanner C. Printer D. Voice recognition

Answers

The printer may be used as an input as well as an output device. As an input you can print documents on it and send them on e-mail address for example. As an output if the printer is connected in LAN you can send the document to the printer. The other devices are only output devices, 

Which dos attack tool, that is based on the dos operating system, sends out fragmented ip packets and can be used to target windows systems and network devices, such as cisco routers?

Answers

Denial-of-service (DoS) attacks usually flood servers, systems or networks with high traffic in order to engulf the victim resources and make it impossible for legitimate users to use them. This results to crashing the server. In this case, a tool used to attack windows servers and network devices in fragmented ip packets form is called “Jolt2”.

Answer: Jolt2

QUICK TRUE/FALSE QUESTION
A Uniform Resource Locator (URL) is how the internet knows where to take users when an address is typed into a browser.

True or False

Answers

true because if u break the law, the police can track u down like that.

Answer:

True

Explanation:

The URL is a unique resource used to locate the resource on the internet. This is commonly known as the web address. The web address consists of many parts: the protocol identifier and the IP address of the computer.

URL protocols consist of the Hypertext Transfer Protocol (HTTP) or the HTTP for secure browsing and email communication. The URL specifies the following about a website:

path to a specific page

network port used to make the connection

specific reference point, e.g. HTTML

and

query of search information, e.g a website extension.

The URL is important to identify and distinguish between true and malicious sites.

Is an integrated system of software, encryption methodologies, protocols, legal agreements, and third-party services that enables users to communicate securely?

Answers

The answer to this question is a Public Key Infrastructure. Public Key Infrastructure or PKI is a tool that enables the users to open or unsecure a network. A PKI consists of a software and hardware standards in order to manage and create digital certificates. A certificate authority, registration authority, certificate database, and a certificate store are the key elements of a PKI.

A student sits down at a computer and presses the power button. the computer does not turn on. what is a logical explanation as to why the computer does not work? how would the student test that idea?

Answers

Since the computer is not working, it is best for the student to test methods that will ensure that there may be complications as to why it is not turning on and why it still off. The most basic step in determining the reason is whether the computer's plug is plugged in the outlet and the student should ensure whether it is plug or unplug.

When you connect to your isp's pop, the isp and the equipment at the pop go through a process called _________, establishing the speed of the internet connection, and then proceed to _________?

Answers

ISP stands for Internet Service Provider and it's the company that provides the connections to access the Internet.When you connect to your ISP's pop, the ISP and the equipment at the pop go through a process called handshaking, establishing the speed of the internet connection, and then proceed to authentication. Handshaking is the exchange of signals between devices in order to regulate the data transfer. Authentication is the verifying of the identity of a user or process.

The ____ property configures a shadow effect on the text displayed within an element

Answers

Shareder Is the answer I put. 
Other Questions
A person who is heterozygous for the huntington disease (hd) allele has offspring with someone who does not have hd. what proportion of their children will have hd? Which of the following describes how bacteria can receive or exchange genetic material?(A) In transformation, some bacteria pick up pieces of DNA from the environment.(B) In conjugation, two bacterial cells temporarily join and transfer genetic material between them.(C) In transduction, viruses infect bacteria, carrying gene from one cell and injecting them into another.(D) All responses apply Dominique is thinking about buying a house. The table below shows the projected value of two different houses for three years. House 1 (value in dollars) year 1: 286,000 year 2: 294,580 year 3: 303,417.40 House 2 (value in dollars) year 1: 286,000 year 2: 295,000 year 3: 304,000 Part A: What type of function, linear or exponential, can be used to describe the value of each of the houses after a fixed number of years? Explain your answer. Part B: Write one function for each house to describe the value of the house f(x), in dollars, after x years. Part C: Dominique wants to purchase a house that would have the greatest value in 25 years. Will there be any significant difference in the value of either house after 25 years? Explain your answer, and show the value of each house after 25 years. Which of the following is most likely to result in personal harm or injury during physical activity? Adjusting your intensity when your heart rate goes above or below your training zone Continuing an activity when you experience pain or dizziness to help the feeling pass Drinking fluids before, during, and after activities to maintain proper hydration Walking briskly for 10 minutes to warm up before starting a more intense activity A chemical bond that forms when atoms share electrons is always a(n) _________________________. Simplify fraction 23076923076923/10000000000000 What is the distance between the points (22, 27) and (2, -10)? if necessary, round your answer to two decimal places.a. 57 units? According to vygotsky, if one child receives assistance he/she may improve substantially more than another child who does not receive help. the assistance or structuring provided by others is termed Which of the following best describes the cell cycle What is the area of the obtuse triangle given below? Raul has $640 saved, and jaime has $320 saved. They each begin a new job on the same day and save all of their money. Raul earns $180 per day and jaime earns $200 per day. In how many days will they have an equal amount of money The path of a ping pong ball that is hit from one end of the table can be modeled by the equation (y= -1/4 x^2 5x) where x is measured in inches and represents the horizontal distance from the edge of the table, and y represents the height of the ping pong ball in inches above the table. What is the maximum height of the ping pong ball? A. The ball reaches a maximum height of 30 inches above the table. B. The ball reaches a maximum height of 20 inches above the table. C. The ball reaches a maximum height of 25 inches above the table. D. The ball reaches a maximum height of 27 inches above the table. What was the function of the secret police in the Soviet Union? The secret police attempted to identify citizens who opposed the Communist Party and who could undermine it. The secret police worked to locate and arrest the missing members of the former royal family of Russia. The secret police tried to solve crimes that directly impacted the workers and peasants of Russia. The secret police tried to uncover Bolsheviks who worked against the provisional government. How much heat is required to raise the temperature of 475 grams of solid aluminum from room temperature (295k) to liquid aluminum at 1050k? How strong is the electric field between the plates of a 0.86 f air-gap capacitor if they are 2.0 mm apart and each has a charge of 64 c? Interpersonal communication occurs at which two levels answer Management at hottie potatee, a nationwide potato bar chain, believes that its customers value a predictable and consistent level of service and quality. when customers stop at one of its potato bar chain restaurants anywhere in the united states, they should know what to expect in terms of menu, price and quality. in order to maintain this consistency, hottie potatee adopted a(n) ______ structure. What is a glucose standard curve, and why did you need to obtain one for this experiment? did you correctly predict how you would measure the amount of plasma glucose in a patient sample using the glucosestandard curve? The depth of the water at the end of a pier changes periodically along with the movement of tides. On a particular day, low tides occur at 12:00 am and 12:30 pm, with a depth of 2.5 m, while high tides occur at 6:15 am and 6:45 pm, with a depth of 5.5 m. Let t = 0 be 12:00 am. Which periodic function, sine or cosine, would be a simpler model for the situation? Explain. Who was a civil rights activist that emerged during the 1930s and planned a march during franklin d. roosevelt's administration? Steam Workshop Downloader