1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MakcuM [25]
4 years ago
10

âwhat service uses a private cloud in conjunction with a web browser or downloaded client software to access desktop software?

Computers and Technology
1 answer:
Vera_Pavlovna [14]4 years ago
5 0
<span>The answer should be: Virtual Desktop Infrastructure</span>
You might be interested in
Travis sends Suri what purports to be a link to an e-birthday card, but when she clicks on the link, software is downloaded to h
12345 [234]

Answer:

Identity Theft

Explanation:

Identity theft is the act of someone who obtains details about someone else illegally.  This is done to find personal and financial information such  name, address,social security number, passwords, and credit card number, phone number, e-mail, etc. Then the hacker can use this information to control bank accounts, e-mails, computers, portray himself as you are, or sell information to someone else.

3 0
3 years ago
The UIDs for a set of hierarchical entities can be propagated through multiple ________ relationship
SOVA2 [1]

The unique identifier (UIDs) for a set of hierarchical entities can be propagated by using multiple <u>barred</u> relationship.

<h3>What is a UID?</h3>

UID is anacronym for unique identifier and it can be defined as an alphanumeric or numeric string that is associated with a single entity or unique among all identifiers within an information system (IS).

This ultimately implies that, unique identifier (UIDs) are identifiers that marks a particular record within an information system (IS) as unique from every other record.

In Computer science, the unique identifier (UIDs) for a set of hierarchical entities can be propagated by using multiple <u>barred</u> relationship because they represent the relationships between the originating entities and the intersection entity.

Read more on a unique identifier here: brainly.com/question/25619349

5 0
3 years ago
Consider an improved version of the Vigen ere cipher, where instead of using multiple shift ciphers, multiple mono-alphabetic su
anzhelika [568]

Answer:

Kasiski’s method for determining 't' works for Vigenère cipher as well. The only difference is therefore in the second stage of the attack. In the second stage, one needs to build a frequency table for each of the 't' keys, and carry out an attack like on the mono-alphabetic cipher. Given a long enough plaintext, this will work successfully.

Explanation:

Kasiski method is a method of attacking polyalphabetic substitution ciphers such as Vigenère cipher. It is also called Kasiski test or Kasiski examination.

The method involve finding the length of the keyword and then dividing the message into that many simple substitution cryptograms. Frequency analysis could then be used to solve the resulting simple substitution.

6 0
4 years ago
Under what category of programs and apps do databases and enterprise computing fall?
Evgesh-ka [11]
Answer is productivity

Sometimes called the office or personal productivity software, productivity software is dedicated to producing databases, spreadsheets, charts, graphs, documents, graphs, digital video and worksheets. Reason behind the name productivity is due to the fact that it increases productivity in office work.

6 0
3 years ago
Can a normal glass prevent eye issues like wearing anti radiation glasses?​
Marizza181 [45]

yes, any protection for the eye will help.

hope this helps!

7 0
3 years ago
Read 2 more answers
Other questions:
  • Complete the following sentence.
    13·2 answers
  • 5. Create a vector called to20 that goes from 1 to 20 (use the range notation). Now create a variable called end that goes from
    9·1 answer
  • A friend of yours is having trouble getting good Internet service. He says his house is too remote for cable TV—he doesn’t even
    11·1 answer
  • How auto insurance companies manage risk?
    12·1 answer
  • The first step in the information processing cycle involves the _____ of data.
    10·1 answer
  • Which of the following tasks can you perform using a word processor?
    12·1 answer
  • Problem: you need to write a code that read 2 array of size 10x10 of zero and ones that represent black
    8·1 answer
  • Sales management wants a small subset of users with different profiles and roles to be able to view all data for compliance purp
    7·1 answer
  • I WILL GIVE BRAINLIST THING TO WHOEVER GIVES ME THE CORRECT ANSWER
    11·1 answer
  • Why should you avoid the use of sarcasm, clichés, and idioms in business<br> letters
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!