1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
EastWind [94]
3 years ago
7

With an Internet connection, you can view, modify and delete files stored in your

Computers and Technology
1 answer:
Soloha48 [4]3 years ago
4 0

Answer:

Computer

Explanation:

Files stored in the "cloud" are stored remotely in some file system in one or more data centers. To access these files from any device you need to have an internet connection. Technically speaking, you can Create, Read, Update and Delete(C.R.U.D) anything stored in any cloud from any internet connected device as long as you have the permission to do so.

You might be interested in
1. Conflict resolution is the process of solving disputes and disagreements.
gtnhenbr [62]
1. Conflict resolution is the process of solving disputes and disagreements.

A. True


2. Project managers have the overall responsibility for planning, executing, and completing a project.

A. True


3. Read the following scenario:

A project will require more people than originally estimated.

Identify the possible risks to the project.

B. Money and resources


4 0
3 years ago
Write a C++ program that searches for anagrams in a dictionary. An anagram is a word obtained by scrambling the letters of some
Semmy [17]

Answer:

d, avt, car, feet, more, pitch, rome, tac, teef,

Anagrams of b in dictionary

Anagrams of cat in dictionary

avt, cat, tac,

Anagrams of room in dictionary

more, rome,

Anagrams of hello in dictionary

Anagrams of  in dictionary

Explanation:

// FindAnagrams.cpp : it is the starting point of application console.

//

#include <vector>

#include <hash_map>

#include <iostream>

#include <string>

#include <algorithm>

#include <map>

#include <set>

using namespace std;

using namespace stdext;

bool IsAnagrams(string& strA, string& strB)

{

   list<char> listA(strA.begin(), strA.end());

   list<char> listB(strB.begin(), strB.end());

   listA.sort();

   listB.sort();

   return listA == listB;

   // return equal(listA.begin(), listA.end(), listB.begin());

}

string SortChars(string str)

{

   list<char> l(str.begin(), str.end());

   l.sort();

   return string(l.begin(), l.end());

}

set<string> FindAnagrams(list<string>& dict, string findStr)

{

   map<string, set<string>> d;

   typedef pair<string, set<string>> MyPair;

   for(list<string>::const_iterator it = dict.begin(); it != dict.end(); ++it){

       string str(SortChars(*it));

       if(d.find(str) == d.end()){

           set<string> s;

           s.insert(*it);

           d.insert(MyPair(str, s));

       }

       else{

           d[str].insert(*it);

       }

   }

   string sortedStr(SortChars(findStr));

   return d[sortedStr];

}

int main(int argc, char* argv[])

{

   list<string> dict;

   dict.push_back("c");

   dict.push_back("car");

   dict.push_back("avt");

   dict.push_back("taac");

   dict.push_back("feet");

   dict.push_back("teef");

   dict.push_back("rom");

   dict.push_back("more");

   dict.push_back("pit");

   dict.sort();

   cout << "The dictionary: " << endl;

   copy(dict.begin(), dict.end(), ostream_iterator<string>(cout, ", "));

   cout << endl;

   list<string> testCases;

   testCases.push_back("d");

   testCases.push_back("car");

   testCases.push_back("rome");

   testCases.push_back("hell");

   testCases.push_back("");

   for(list<string>::iterator it = testCases.begin(); it != testCases.end(); ++it)

   {

       cout << endl << "Anagrams of " << *it << " in dictionary" << endl;

       set<string> output = FindAnagrams(dict, *it);

       copy(output.begin(), output.end(), ostream_iterator<string>(cout, ", "));

       cout << endl;

   }

   return 0;

}

8 0
3 years ago
modern managed cloud service providers will often use secure keyboard/video/mouse (kvm) devices within their data centers. these
professor190 [17]

A cloud service providers uses KVM in their data centers because they are gravely concerned with insider threats.

KVM is a system for management, monitoring and control of a data center environment from a central location. In the data center this system is very necessary because the data center has multiple servers and computers. With this system the server can be connected and controlled from a remote location. This includes mapping the physical locations of accessible virtual drives.

Your question is incomplete, but most probably you full question was:

Modern managed cloud service providers will often use secure Keyboard/Video/Mouse (KVM) devices within their data centers. these devices are extremely expensive compared to their non-secured counterparts. which of the following is one of the reasons cloud service providers do this?

  • They have plenty of revenue and can afford it
  • They are gravely concerned with insider threats
  • Cloud data centers need very few of these devices
  • Managed cloud providers often manufacture their own devices as well

Learn more about servers brainly.com/question/27960093

#SPJ4

7 0
1 year ago
____ the most popular word processing applications software<br><br>​
Kamila [148]

Answer:

Microsoft word.......

5 0
2 years ago
Machine language library routines are installed on computers Select one: a. because they can come as part of the operating syste
Licemer1 [7]

Answer:

c. all of these choices

Explanation:

all of them are correct. i took a quiz on this like 2 days ago and that was the answer.

<em>hope this helpsssssssss!!!!!!!!!!! :):):)</em>

6 0
4 years ago
Other questions:
  • If you feel that an OSHA inspection is needed to get hazards corrected at your workplace which is the best option
    9·1 answer
  • What does an operating system do?
    11·2 answers
  • You are the systems administrator for a scientific research company that employs over 100 scientists who write and run Linux pro
    13·1 answer
  • The union of two bags is a new bag containing the combined contents of the original two bags. Design and specify a method union
    14·1 answer
  • What computing platform was designed to help a beginner create interactive objects that receive input from sensors and use that
    11·1 answer
  • Value or power of a network grows exponentially as a function of the number of network members. this is known as ________ law.
    8·1 answer
  • Write a function called simulate_several_key_strikes. It should take one argument: an integer specifying the number of key strik
    7·1 answer
  • In OOP terminology, an object's member variables are often called its ________ and its member functions can be referred to as it
    6·1 answer
  • What is computer graphics uses of computer graphics​
    14·1 answer
  • Can u guys report me as much as u can I’m trying to delete this account
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!