A _________ is a person or organization that maintains a business relationship with, and uses service from, cloud providers.

A. cloud auditor
B. cloud broker
C. cloud carrier
D. cloud consumer


D. cloud consumer

Computer Science & Information Technology

You might also like to view...

A file ____________________ is a set of characters added to the end of a file name to indicate the file's contents and origin.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The command find / name "file?" print

a: displays the absolute pathnames such as file1, filea, fileA b: searches from the home directory c: searches from the current directory d: finds all files that have filenames such as myfile or yourfile e: all of the above

Computer Science & Information Technology

The elements of an array are accessed by their _______.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The CIA triad is based on three characteristics of information that form the foundation for many security programs: ____.

A. confidentiality, integrity, and asset B. confidentiality, integrity, and availability C. confidentiality, information, and availability D. communication, information, and asset

Computer Science & Information Technology