1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Viefleur [7K]
1 year ago
11

reagan's firm has not had to make large investments in computer or networking hardware or in personnel to maintain the hardware

because they use public cloud computing. reagan recognizes that this demonstrates which key benefit of public cloud computing?
Computers and Technology
1 answer:
Kaylis [27]1 year ago
6 0

The usage of hosted services such data storage, servers, databases, networking, and software through the internet is referred to as cloud computing.

Since the advent of cloud computing, the number of cloud-based IT services and apps has exploded around the globe and is still growing. By 2021, practically all of the small and major applications we use will be stored in the cloud, saving us money, time, and storage space. The sorts of cloud computing are covered in this article, along with ten trends to look out for in 2021. The back-end layer is composed of computers, servers, central servers, and databases, as well as software. This layer, which is the foundation of the cloud, is only in charge of safely storing data.

Learn more about database here-

brainly.com/question/6447559

#SPJ4

You might be interested in
Statement Widgets or gadgets are _____ programs that appear on the desktop and display little pieces of information such as a ca
Phoenix [80]

Answer:

The answers of the following blanks are:  

1). utility  

2). malware

3). Trojan horses

4). platform

5). device drivers

Explanation:

Utility Program, these programs are that program which appears when you start your system at your desktop window. Such as, calculator, calendar, CPU meter, and many other little programs. It also known as gadgets and widgets.

Malware is also known as malicious software, it is a program or a file that corrupt your software and it is a virus that harms your system.

Trojan Horses is a program or a file which access your password and personal details. It not just like a virus because it does not harm your computer but it access your things.

Operating system is also known as a Platform that manages your software and the hardware.

Device Drivers are the drivers that are needed in your system to work the hardware devices and without it, some of the important software and the hardware do not work.

5 0
3 years ago
What are five most important areas of the animal industry that involve science and technology?
BigorU [14]

Animal Health, Breeding, Meat Sanitation/Preservation, Feeding, Waste Disposal

3 0
3 years ago
To print the number of elements in the array named ar, you can write :
Diano4ka-milaya [45]

Answer:

Option c is correct.

Example :

public class Subject

{

public static void main(String [] args)

{

int ar[]={5,4,6,7,8};

System.out.println("the number of array elements are: ",ar.length);

}

}

Explanation:

The above program is created in java language in which Subject is a class name.Inside Subject class , there is main method.

Inside the main method, there is An array named 'ar' which data type is an integer and we have assigned the value to this array.

in the next line, we are printing the total no. of the element in the array with the length function which displays the length of an array or variable.

8 0
3 years ago
Identify a statement that accurately differentiates between short-term memory and working memory.
Veronika [31]

Answer:

Short term memory is in which a person may forgot very previously introduced knowledge, whereas working memory...well...works. Most people have working memory.

Explanation:

5 0
3 years ago
A computer supply company is located in a building with three wireless networks.
Sonja [21]

Answer:

A. Rogue access point

Explanation:

A rogue access point is defined as a wireless access point installed on a secure network infrastructure without consent of the owner of the network or without due authorization. While this can sometimes be added by a malicious attacker, it is most commonly set up by employees with the desire to have wireless access even when there is any available.

In the question, there are three wireless networks, but on scanning, five wireless networks were found, hence they are rogue access point.

3 0
3 years ago
Other questions:
  • What is the primary purpose for a screen saver in windows?
    8·1 answer
  • Which element of a business document provides additional information but is not a part of the body of the text?
    13·2 answers
  • How to find i with superposition method
    8·1 answer
  • Which protocol is used by the client for microsoft networks and file and printer sharing for microsoft networks to communicate w
    10·1 answer
  • Charli's password was changed a couple of weeks ago because someone figured it out. Can someone go to a password generator and f
    5·2 answers
  • Name the different type of vegetation found in India ?​
    8·2 answers
  • What are the different ways to represent compounds? Check all that apply. a structural formula a ball model a space-filling mode
    13·2 answers
  • Write the definition of a function named fscopy. This function can be safely passed two fstream objects, one opened for reading,
    11·1 answer
  • For this activity, you will practice being both proactive and reactive to bugs. Both are necessary to get rid of errors in code.
    5·1 answer
  • You can't cite Wikipedia, what are three ways that you can use it for your research?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!