1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vikki [24]
4 years ago
13

Which applications run on IHGs private cloud?

Computers and Technology
1 answer:
Svetlanka [38]4 years ago
6 0

Answer:

Applications CSS and JvaP

Explanation:

You might be interested in
Match the component to its function. resistor inductor capacitor battery transistor This component stores a temporary charge. ar
OlgaM077 [116]

Answer:

1. Capacitor.

2. Inductor.

3. Resistor.

4. Battery.

5. Transistor.

Explanation:

1. <u>Capacitor</u>: this component stores a temporary charge.  

2. <u>Inductor</u>: this component stores electric energy in the form of a magnetic field.

3. <u>Resistor</u>: this component prevents components from overheating.

4. <u>Battery</u>: this component produces electricity by converting chemical energy into electric energy.

5. <u>Transistor</u>: the voltage applied to the base can control the current that flows across the emitter and collector.

6 0
3 years ago
Read 2 more answers
Indicates the beginning and ending of your code written in HTML
lawyer [7]

Answer:

<body> ...</body>

indicates the beginning and ending of your code written in HTML

Explanation:

4 0
3 years ago
Which of the following is the safest authentication method?
myrzilka [38]

The safest authentication method is authentication using a smart card.

Smart Card Authentication uses a physical card along with a smart card reader and software on the workstation to validate users into enterprise resources like workstations and applications. Although smart card authentication offers a terrible user experience and is expensive to deploy and maintain, it is very secure.

Because smart card authentication requires a physical credential, a hardware card reader, and software, it is expensive and difficult to administer. Smart cards are only used in the most secure workplaces, such as three-letter agencies of the federal government or privileged access at a financial institution, as these environments frequently forbid employees from carrying smartphones to and from work.

To learn more about Authentication click here:

brainly.com/question/17217803

#SPJ4

6 0
2 years ago
Kevin is working on a financial project that involves a lot of statistical information. He needs software that allows him to ent
makvit [3.9K]

Answer: Spreadsheet Software

If Kevin would use a spreadsheet software, he will be able to input all of the statistical data and have the software generate graphs of the data that he has inputted into the spreadsheet. Using a spreadsheet software, Kevin will also have access to changing the graphs data whenever an anomaly has been detected.

Some of examples of these software would be:

  • Microsoft Excel
  • Open Office
  • Google Sheets
  • LibreOffice

8 0
3 years ago
What is the importance of human flourishing to science and technology?​
nadya68 [22]

Explanation:

:*):*):*)*)*:)*:)*:*)*:**:*)*:)*:)*:*):*)*P:)*:*):*)

:*

):*

)*:

)*:*

):*):*)*:*):*)*:*):*):*):)*:*):*):*):*)

:*):*)

6 0
3 years ago
Other questions:
  • Explain what might happen if two stations are accidentally assigned the same hardware address?
    15·1 answer
  • Which topology connects all the computers in a circular pattern
    13·2 answers
  • What cell phone technology is the most popular in the united states?
    8·2 answers
  • Informatyka klasa 7 daje naj
    10·1 answer
  • The gradual wearing away or breaking down of rocks by abrasion is a type of __________________ weathering.
    8·1 answer
  • How can I change my username here at brainly?
    13·2 answers
  • You have recently subscribed to an online data analytics magazine. You really enjoyed an article and want to share it in the dis
    9·1 answer
  • How do I get the bot token for discord? (scripting etc)
    5·1 answer
  • What is eight bits of data called?
    13·1 answer
  • What is an outcome in a game? Don't search google just give me an answer
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!