1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OleMash [197]
2 years ago
13

What is cloud computing?

Computers and Technology
2 answers:
kupik [55]2 years ago
5 0

Answer:

it is a way to store information dud

Explanation:

-Dominant- [34]2 years ago
3 0
Answer:
A) It is a way to store information on an independent server for access from any device
You might be interested in
For Excel:
Tom [10]
I'm not sure what the 'following formats' are, but simply putting a $ in front of the letter will lock the column reference, and putting a $ in front of the number will lock the row reference. Putting a $ in front of both will allow you to keep the cell reference the same. For example:
A1 should be A$1$ in an equation to keep the reference as A1 for all 'filled down' equations.
3 0
3 years ago
1. Reference initials are always typed on a business letter.
solniwko [45]

Answer:

1. true 2.false 3.a 4.d 5.c 6.d 7. true 8.true 9.true 10.true

Explanation:

5 0
4 years ago
I'd: 9872093250, password: qqqqq, join the meeting​
jenyasd209 [6]
No thanks but Happy Mother’s Day!!!
8 0
3 years ago
Suppose that an intermixed sequence of push and pop operations are performed on a LIFO stack. The pushes push the numbers 0 thro
nordsb [41]

Answer:

b) 01564 37928

e) 26 8 75 32 901

Explanation:

Pushes and pulls are the computer operations which enable the user to perform numerical tasks. The input commands are interpreted by the computer software and these tasks are converted into numeric values to generate output.

8 0
3 years ago
What to take for ptsd
REY [17]
Dank memes and medicine
6 0
4 years ago
Read 2 more answers
Other questions:
  • You can create user accounts on the linux system by using the ____ command.
    9·1 answer
  • Which two statements give good definitions of financial credit
    8·1 answer
  • List the various types of social media that have been covered in the tutorial. Mention the key purposes for which each media typ
    9·1 answer
  • Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that i
    13·1 answer
  • CIST 1122 Project 2 Instructions
    11·1 answer
  • Companies expose themselves to harsh sanctions by federal agencies when they violate the privacy policies that their customers r
    8·1 answer
  • IN WHICH COUNTRY DO THEY LET YOU PLAY MINECRAFT IN SCHOOL?
    8·2 answers
  • How do i code........​
    6·2 answers
  • Write a C program to find the sum of 10 non-negative numbers entered by user​
    14·1 answer
  • Lists Five Examples of simple statement<br>​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!