1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksanka [162]
2 years ago
13

Which cloud technology characteristic ensures that a cloud customer can make changes to her cloud database from her smartphone w

hile traveling for a conference and from her laptop when she’s at home?.
Computers and Technology
1 answer:
Setler79 [48]2 years ago
5 0

The cloud technology characteristic that ensures that a cloud customer can make changes to her cloud database from her smartphone is Broad network access.

<h3>What is the network about?</h3>

Broad network access is known to be a feature of cloud computing as it is seen as  the ability of network tools to be able to link with a large scope or variety of devices.

Note that The cloud technology characteristic that ensures that a cloud customer can make changes to her cloud database from her smartphone is Broad network access.

Learn more about cloud technology from

brainly.com/question/19057393

#SPJ1

You might be interested in
Good business ethics is a good marketing strategy. Discuss
Arada [10]
Good business ethics are the key to good marketing and success. Ethics portray whether an individual has good judgment, intelligence, and many more things that are essential to business. Without good ethics business as a whole would be ruthless. Some business ethics are even required by the law in some places and there are rules and regulation to trade. 

Hope that answered your question!
6 0
3 years ago
What is the answer ??​
Natali5045456 [20]

<em>=</em><em> </em><em>Option</em><em> </em><em>b</em><em> </em><em>Minicomputer ..........</em>

3 0
2 years ago
Read 2 more answers
Show the steps of a Selection Sort for the numbers ( 5 3 9 5 ).
Sedbober [7]

Answer:

Sorted array will be:-

3 5 5 9

Explanation:

In Selection Sort algorithm it sorts the array by repeatedly finds the minimum in the array form the array that is unsorted and swaps it with the value at the first position.

The unsorted array:- 5 3 9 5

In first iteration

minimum is 3.

3 will be swapped with 5.

Now the array is 3 5 9 5

sorted array 3

In second iteration

unsorted array is 5 9 5

sorted array 3 5

and the minimum from it is 5

No swapping will occur.

In third iteration

unsorted array is 9 5

minimum is 5

sorted array 3 5 5

swap it with 9.

Now the array is sorted.

3 5 5 9

3 0
3 years ago
How to convert mkv to avi without losing quality?
Alexus [3.1K]
Ive done this before with success.
You will need <span>FFmpeg.</span>
https://superuser.com/questions/227338/how-to-convert-an-mkv-to-avi-with-minimal-loss
7 0
3 years ago
Traveling abroad to have sex with underage children is known as?
insens350 [35]
The correct answer I believe is A Sex offender
3 0
3 years ago
Read 2 more answers
Other questions:
  • The ____ cell on the worksheet is the one into which you can enter data.â
    15·2 answers
  • To create a new folder, press ____.
    12·1 answer
  • A document with a(n) ____ guarantees that the document was indeed sent by a specific individual and that it hasn t been tampered
    10·1 answer
  • As an improvement of the ATX form factor over AT, shorter wires made it easier to shield them and made them capable of handling
    6·1 answer
  • Select the education and qualifications that are most helpful for business analysis careers. Check all that apply
    11·2 answers
  • What does the -pwd switch do? how can you make dsadd bring up a prompt asking for the users password?
    10·1 answer
  • Truth or dare????????????
    5·1 answer
  • List out any four hardware and software components required for multimedia​
    10·1 answer
  • You have just received a generic-looking email that is addressed as coming from the administrator of your company. The email say
    8·1 answer
  • __________, a level beyond vulnerability testing, is a set of security tests and evaluations that simulate attacks by a maliciou
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!