1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stells [14]
3 years ago
6

______________is a collection of technologies for abstracting the details of how applications, storage, network, and other compu

ting resources are delivered to users
Computers and Technology
1 answer:
Daniel [21]3 years ago
7 0

Answer:

The correct answer to the following question will be "Cloud computing".

Explanation:

A series of technologies too abstract the specifics of how users are supplied with the software, data, network, and other computing services, called Cloud computing. On-demand, the accessibility of computer resources, database space, and computational complexity, with little or no particular active user administrators.

This term is commonly used to define network infrastructure which is available to several users over the internet.

There are different types of cloud computing. These are as follows:

  • Infrastructure-as-a-Service (IaaS).
  • Software-as-a-Service (SaaS).
  • Platform-as-a-Service (PaaS).

Therefore, Cloud computing is the right answer.

You might be interested in
Technology deals with...
aivan3 [116]

Answer:

<em>C</em>

Explanation:

technology deals with the use of computers in school and work

4 0
3 years ago
In many cases, a ribbon organizes buttons and options in Select one: a. menus. b. sections. c. toolbars. d. groups.
katrin2010 [14]

Answer:

The answer is Groups

Explanation:

A ribbon organizes buttons and a program’s options into a series of groups or tabs at the top of the window. Typical ribbon tabs are composed of groups that are labeled as closely related commands. Dividing commands into groups in most Microsoft Office application helps users structure users structure the commands into related sets.

5 0
4 years ago
Read 2 more answers
What movie won best picture oscar for 1990
tamaranim1 [39]
I think <span>Dances with Wolves</span>
8 0
3 years ago
Read 2 more answers
Fill in the blank with the correct response.<br> A _<br> is an unknown network.
alexgriva [62]

Answer:

ip address

Explanation:

please mark brainliest

7 0
3 years ago
What term is defined as private data placed in a packet with a header containing routing information that allows the data to tra
xeze [42]

Answer:

Encapsulation

Explanation:

Encapsulation is referring to the concept that data buding with some approach or method that is applied to that selected data.  it also restricts the use of some internal data of an object. The motive behind restricting the data is to prevent the misuse of the data.

For example- in java, encapsulation is refer to the wrapping of code with the data in one unit.

7 0
4 years ago
Other questions:
  • One critique of determining the effectiveness of the psychodynamic perspective is that its theories are too vague to test. t/f
    14·2 answers
  • Which of the following queries can have a Fully Meets result? Select all that apply. True False [adobe website], English (US) Tr
    7·1 answer
  • Write a switch statement that tests the value of the char variable response and performs the following actions: if response is y
    9·1 answer
  • The growing network of physical objects that will have sensors connected to the Internet is referred to as the ________.
    13·1 answer
  • What are the file sharing copyright laws in your area? Are they more strict or less strict than those in other areas of the worl
    9·1 answer
  • True or False: Wire service provide tabloid news reports to media outlets.
    12·1 answer
  • Choose the correct term to complete the sentence.
    10·2 answers
  • How to get free PS5?
    8·2 answers
  • Which important aspect of the Roman Empire did the barbarians destroy?
    14·2 answers
  • An attacker obtains a connection to your LAN and then uses SETH to perform a MiTM attack between your system and the company RDP
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!