1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mash [69]
2 years ago
8

________ occurs when users move their activities, especially long-running transactions, across devices.

Computers and Technology
1 answer:
choli [55]2 years ago
6 0

Cloud computing occurs when users move their activities, especially long-running transactions, across devices.

<h3>What is cloud computing?</h3>

Cloud is known to be a kind of network-based access that is made with communication tools along such as emails and calendars.

Note that in the case above, Cloud computing occurs when users move their activities, especially long-running transactions, across devices.

Learn more about Cloud computing from

brainly.com/question/19057393

#SPJ1

You might be interested in
in a typical e-mail address, the "host" is A. an account designated by a user name B. CPU processor 2500 C. the receiver of an e
NISA [10]
The correct answer is A! :)
5 0
3 years ago
Read 2 more answers
Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. The company's biggest
Y_Kistochka [10]

Answer:

The Encryption solution that best prevents a competitor from receiving confidential information is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

Explanation:

Solution:

From my own perspective the encryption solution that i will use that prevents s a competitor from receiving confidential information and justify the recommendation is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

This is because in this case we have to share data confidentially (information need to be hidden from Unauthorized  security access. also these provides the Transport Layer security that we needed in above example above.

The purpose of these protocol is to provide server and client authentication, Data confidentiality,and Data integrity (protected from unauthorized change). Application Layer client/server program such as HTTP that uses the service of TCP can encapsulate their data in SSL Packets.

SSL (Secure Socket Layer): is defined as the normal technology for protecting an internet connection secure and defend any sensitive data that is being sent between two systems, and not allowing criminals from reading and changing any information sent, including potential personal details.

TLS (Transport Layer security): It is a procedure that allows  data integrity  and privacy over Internet communications.

3 0
3 years ago
More than 700 people in the United States have been infected with monkeypox virus American vector: the epidemic is spreading lik
erik [133]

An epidemic that is spreading like a snowball is one that is that is moving in a gradual or seasonal rate.

<h3>What is snowball spread of virus?</h3>

An epidemic is said to be spreading like a snowball if  it is said to be moving at a rate.

Note that in the case of monkey virus, the epidemic that is spreading like a snowball is one that is that is moving in a gradual or seasonal rate.

Learn more about epidemic  from

brainly.com/question/15452937

#SPJ1

5 0
2 years ago
Mainframe computers have several CPUs, have very fast processor speeds, can supporting multiple operating systems and have huge
Marrrta [24]

Answer:

True.

Explanation:

Mainframe computers were developed and introduced in the early 1950s.

Mainframe computers have several CPUs, have very fast processor speeds, can supporting multiple operating systems and have huge amounts of storage capacity. As a result, mainframe computers are mostly or commonly used by large companies, business firms or governmental institutions for performing various complex tasks such as census, financial transactions, e-commerce, data sequencing, enterprise resource planning, etc.

7 0
3 years ago
A team of researchers wants to create a program to analyze the amount of pollution reported in roughly 3,000 counties across the
omeli [17]

The option that is most likely to be a challenge in creating the program is Different counties may organize data in different ways.

<h3>What is Pollution?</h3>

Pollution is known to be a kind of bringing in of harmful materials into an environment.

These harmful things are known as pollutants. Pollutants are known to be natural and artificial that is they are created by human activity, such as trash or runoff produced by factories, etc.

Learn more program from

brainly.com/question/1538272

7 0
2 years ago
Other questions:
  • This type of connection uses radio waves to connect devices on a network.
    9·2 answers
  • Explain how applying different network topologies could have an impact on the security of a network
    11·1 answer
  • One of the Employee responsibilities to LOTO is:
    5·1 answer
  • Random letter of the alphabet for Python coding
    11·2 answers
  • Which of the following illustrations is depicted in the icon that's used to access Windows Help and Support files?
    13·1 answer
  • In what type of cluster does every server perform useful work so that if one fails, the remaining servers take on the additional
    7·1 answer
  • What does "scanf(\"%d\" mean?
    13·2 answers
  • Kristi, an event planner, wants to store caterers’ names and contact information in an organized manner. Kristi will MOST LIKELY
    13·1 answer
  • Assignment 4: Evens and Odds
    11·1 answer
  • Match each role to the corresponding web development task.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!