1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sav [38]
4 years ago
9

What are the disadvantages of cloud computing?

Computers and Technology
1 answer:
beks73 [17]4 years ago
4 0

Answer: Cloud computing is the service that helps the usage of the services of the computer system parts (hardware and software) over a network .The disadvantages of the cloud computing are as follows:-

  • Cloud hacking-there are cases of the cloud hacking which is a incident against the security of the cloud computing devices.
  • Technical problem-there is no quick fix provision for the mending the technical issue in the cloud computing network .
  • Restricted features:-there are limitation on the number of features that are found in the different cloud computing such as accessibility , security, space.etc.

You might be interested in
If you were practicing keyboarding and the excercise contained the letters q,o,e,p,r and t, what section of the keyboard are you
AfilCa [17]
Top row keys i belive sorry if im wrong

3 0
3 years ago
Jim maintains attendance records for his employees for the year. Row B includes the dates of attendance, and column A includes t
ahrayia [7]
To lock multiple rows (starting with row 1), select the row below the last row you want frozen, choose the View tab, and then click Freeze Panes. To lock multiple columns, select the column to the right of the last column you want frozen, choose the View tab, and then click Freeze Panes<span>.


I hope my answer has come to your help. Thank you for posting your question here in Brainly. We hope to answer more of your questions and inquiries soon. Have a nice day ahead!
</span>
4 0
4 years ago
Read 2 more answers
Injection attacks variants can occur whenever one program invokes the services of another program, service, or function and pass
velikii [3]

Answer:

True

Explanation:

In Computer science, It's true that injection attacks variants can occur whenever one program invokes the services of another program, service, or function and passes to it externally sourced, potentially untrusted information without sufficient inspection and validation of it.

5 0
3 years ago
Complete the following sentences using the drop-down menus.
shepuryov [24]

Answer:

✔ E-mail

is considered by some to be the most important program because of its popularity and wide use.

✔ Presentation

applications are used to display slide show-style presentations.

✔ Spreadsheet

programs have revolutionized the accounting industry.

Explanation:

just did it on edg this is all correct trust

7 0
3 years ago
One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with ex
GaryK [48]

Answer:

Email Bomb

Explanation:

According to my research on information technology, I can say that based on the information provided within the question the statement is False. The term being defined by the statement in the question is not called a mail spoof instead it is actually called an Email Bomb.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
4 years ago
Other questions:
  • What is the purpose of news services
    13·1 answer
  • To illustrate a point in a Word document with a simple chart, what commands should you select?
    8·2 answers
  • Explain the differences between kernel applications of the OS and the applications installed by an organization or user.
    6·1 answer
  • Count positive and negative number and compute the average. The program will have the user input an unspecified number of intege
    6·1 answer
  • What is the best data structure to solve the following problem? a) A list needs to be built dynamically. b) Data must be easy to
    11·1 answer
  • The 10 IISSCC _____ cover 17 NIST control _____ which are arranged in three _____ called management, operational, and technical.
    13·2 answers
  • Fill in the blanks of the SQL Statements: Fund_Id VARCHAR(10) , Donor_id VARCHAR(10) , Count_Of_Receipts INTEGER, Total_Receipts
    15·1 answer
  • Draw the tree that results when you add the values 10, 20, 30, 40, 50, 60, 70, 80, 90, 100 to each of the following initially em
    15·1 answer
  • Which of the following statements is true of subroutines? Check all that apply.
    15·2 answers
  • WHERE DO I GO TO DO THIS AND WHAT DO I WRITE?????
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!