1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elis [28]
3 years ago
7

Cloud storage refers to the storage of data on ______.a. your mobile device.b. your desktop computer.c. an external drive.d. a s

erver on the Interne.
Computers and Technology
1 answer:
eimsori [14]3 years ago
6 0

Answer:

D.  server on the internet

Explanation:

You might be interested in
Kevin is a DJ and has a passion for creating and modifying audio tracks. Which application software facilitates him in his passi
stiv31 [10]
B. Multimedia software
5 0
3 years ago
Consider the operation of deleting the root of a binary search tree. if the root has one child, then ________.
PSYCHO15rus [73]

The reference to the root of the tree should be set to null

<h3>Can the root of a binary tree be null?</h3>
  • Only the subtrees are nulled out, the root always remains and will never be set to null.
<h3>What is null root?</h3>
  • null-, root. -null- comes from Latin, where it has the meaning "none; not one.
  • '' This meaning is found in such words as: annul, null, nullify.

To learn more about it, refer

to brainly.com/question/24448358

#SPJ4

4 0
2 years ago
What action(s) should commanders consider to ensure information sharing with partners of foreign countries?
timofeeve [1]

Answer:

The correct answer to the following question will be given below:

Explanation:

  • Working to develop sufficient power to allow foreigners to do so.
  • Disclosure and sharing of information (includes staffed by Foreign Disclosure Officers (FDO).
  • Trying to instill an open culture that balances with the stakeholders an attitude of "want-to-share" and "want some-to-know."
  • Consideration of both digital and physical communication implies information gain and knowledge creation.
7 0
4 years ago
The graph of a function f x is shown below what is the domain of f x​
patriot [66]
Was there supposed to be a picture here?
4 0
3 years ago
Lourdes is going to create a company logo. She will create it in a vector format so that she can resize it without distortion. W
kirill [66]

Explanation:

military

hope this helps you

5 0
3 years ago
Other questions:
  • Write an application that encodes English-language phrases into pig Latin. Pig Latin is a form of coded language. There are many
    8·1 answer
  • What is a method whereby new problems are solved based on the solutions from similar cases solved in the past?
    9·1 answer
  • Compare and contrast fair use to copyright.
    5·1 answer
  • A variable of the data type arrays is storing 10 quantities. What is true about these quantities?
    10·1 answer
  • Someone claims that the big O notation does not make sense at all, and they give the following example. An algorithm A that proc
    15·1 answer
  • Using a process known as ____, network-based IDPSs look for attack patterns by comparing measured activity to known signatures i
    7·1 answer
  • a machine needs a minimum of 100 sec to sort 1000 names by quicksort what is the approximate worst case time needed to sort 100
    13·1 answer
  • Add and multiply
    10·1 answer
  • PLEASE HELP ASAP ILL GIVE YOU 5 STARS AND BRAINLEST
    12·2 answers
  • Which event represents an example of social media being used in an
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!