1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stells [14]
3 years ago
6

______________is a collection of technologies for abstracting the details of how applications, storage, network, and other compu

ting resources are delivered to users
Computers and Technology
1 answer:
Daniel [21]3 years ago
7 0

Answer:

The correct answer to the following question will be "Cloud computing".

Explanation:

A series of technologies too abstract the specifics of how users are supplied with the software, data, network, and other computing services, called Cloud computing. On-demand, the accessibility of computer resources, database space, and computational complexity, with little or no particular active user administrators.

This term is commonly used to define network infrastructure which is available to several users over the internet.

There are different types of cloud computing. These are as follows:

  • Infrastructure-as-a-Service (IaaS).
  • Software-as-a-Service (SaaS).
  • Platform-as-a-Service (PaaS).

Therefore, Cloud computing is the right answer.

You might be interested in
A technician is using a network-attached desktop computer with a Type 2 hypervisor to run two VMs. One of the VMs is infected wi
lianna [129]

Answer:

Place both VMs on virtual NICs that are isolated from the company LAN.

Explanation:

From the scenario above, for the technician to best protect the company's LAN while performing the above mentioned tests, it us best to place both VMs on virtual NICs that are isolated from the company LAN.

Cheers

4 0
4 years ago
Which person would be the best fit for a career in the Information Technology field?
zaharov [31]
The best possible fit would be a person with a creative mind and flexible mind. 
The technical stuff can be taught and learnt. But to evolve and keep up with the pace of how technology improves day to day, you'd need some with flexibility to cope up with this and creativeness to make innovations.
6 0
3 years ago
Read 2 more answers
________ can be written only once. The data cannot be erased or written over once it is saved.​
notka56 [123]

Answer:

WORM (Write Once, Read Many)

Explanation:

The full meaning which means Write Once, Read Many implies that data can only be entered (or better put, written) once. Once the data has been written, the data can not be updated or deleted. However, the data being stored on WORM can be read as many times, as possible.

Hence, WORM answers the question.

6 0
2 years ago
Not all hardware is connected with wires, some hardware might be connected wirelessly with
prisoha [69]

Answer:

B. Bluetooth technology.

Explanation:

A hardware platform can be defined as a collection of hardware such as an input hardware and output hardware device that are compatible with each other and the software application or program to be executed. All hardware platforms have their respective low level or high level machine language that are compatible with the software application. Some examples of a hardware devices are speakers, monitor, x86, i860, keyboard, MIPS, scanner, central processing unit (CPU) video game consoles (joysticks), IBM Z, ARM, unisys, powerpc, SPARC etc.

Generally, all hardware devices are connected with one another through the use of a wire such as cables or wirelessly such as Bluetooth, infrared etc.

Hence, not all hardware is connected with wires, some hardware might be connected wirelessly with Bluetooth technology.

A Bluetooth technology can be defined as a wireless standard used for transmitting and receiving data over a short-range of distance. Therefore, the operating radio frequency of a Bluetooth technology is 2.45 Gigahertz and for a distance of about 10 meters (30 feet).

4 0
3 years ago
In the second example with modulus math, why can't Eve find the solution?
Leno4ka [110]
C. She would have to resort to trial and errors to find a matching exponent
6 0
3 years ago
Other questions:
  • In what way(s) did the password you tried to use not meet the password policy requirements?
    14·1 answer
  • Dr. Patterson’s office calls to give patient Sara Martin her test results from her most recent visit. Her husband answers the ph
    8·2 answers
  • Why would a brokered CD pay more than a regular CD?
    13·1 answer
  • The convergence of information technology and operations technology, offering the potential for tremendous improvements in effic
    14·1 answer
  • Television, radio, newspapers, magazines, the Internet, and other forms of communication are collectively referred to as thea. W
    15·1 answer
  • Differentiate between trusted-source-security and antispoofing-security techniques.
    10·1 answer
  • What is a mod in programming?<br><br> Give more Java questions
    12·1 answer
  • You received an email message stating that your mother's bank account is going to be forfeited if you do not respond to the emai
    6·1 answer
  • Write a Python program that uses three variables. The variables in your program
    12·1 answer
  • An international fast-food chain is looking for opportunities to leverage the Cloud to gain insights into customer data, includi
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!