1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jasenka [17]
4 years ago
11

What is another term for online storage data?

Computers and Technology
1 answer:
Aliun [14]4 years ago
8 0
Another term for online storage data is Cloud storage
You might be interested in
________ is malware that hijacks a user's computer and demands payment in return for giving back access.
Lera25 [3.4K]

Ransom  malware that hijacks a user's computer and demands payment in return for giving back access.

<h3>What is Ransom malware?</h3>

This is known to be a kind of  malware that hinders users from gaining in or access to their system or personal files and it is one that often demands ransom payment so as to get access.

Therefore, Ransom  malware that hijacks a user's computer and demands payment in return for giving back access.

Learn more about Ransom  malware from

brainly.com/question/27312662

#SPJ12

6 0
2 years ago
The following is a training dataset that has ten one dimensional objects.
grandymaker [24]
Yes no no false . . . .
6 0
3 years ago
What is missing in this list of information needed to cite a book?
balandron [24]

Answer:

<h3><em><u>C</u></em><em><u>.</u></em><em><u> </u></em><em><u> </u></em><em><u>City</u></em><em><u> </u></em><em><u>and</u></em><em><u> </u></em><em><u>state</u></em><em><u> </u></em><em><u>where</u></em><em><u> </u></em><em><u>it</u></em><em><u> </u></em><em><u>was</u></em><em><u> </u></em><em><u>published</u></em></h3>

Explanation:

<h3>#CarryOnLearning</h3>

{hope it helps}}

4 0
3 years ago
Alice posts a key for encrypting that anyone can access. Bob uses that key to encrypt a message, then sends it to Alice. When Al
UNO [17]

Answer:

Public key encryption

Explanation:

DescriptionPublic-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.

5 0
4 years ago
A ___________ is similar to an intranet in that it uses internet technologies, but is developed for users outside the organizati
Vanyuwa [196]
The blank is extranet
I hope this helped!
6 0
3 years ago
Other questions:
  • What was the han dynasty and the roman empire known for?
    5·1 answer
  • HELP PLEASE
    7·2 answers
  • Building relationships during your career exploration is called
    9·2 answers
  • when you create workplace documents, it is most important to ensure that they are clear, professional, and a. short. b. informal
    7·1 answer
  • Here's a thought: Why does your Brainly ranking keep going down?
    6·2 answers
  • Which of the following tags contains metadata about the webpage?
    15·2 answers
  • Trish has bought a new computer that she plans to start working on after a week. Since Trish has not used computers in the past,
    10·1 answer
  • Write a program that computes the minimum, maximum, average and standard deviation of the population over time for a borough (en
    6·1 answer
  • When discussing the business requirements of a WLAN design, what is the first question that should be posed
    15·1 answer
  • Hey guys im just curious.... whats ur favorite number
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!