Answer:
find reliable resources
Explanation:
if you find reliable resources, than you might able to have more help i know im not answering..but im trynna help
They may invade privacy rights of air space and be used for other unintended acts such a bombings and espionage
Answer:
The answer is "Option a".
Explanation:
In cloud computing, it is also known as the model, that enables you for accessible, convenient, through the-demand network access to global computer resources, which can be rapid to get and published via low administrative effort.
Its recommending selection for the cloud providers support for the robust encryption, that has adequate replication processes in place, use user authentication, or provide ample clarity to customers regarding mechanisms that defend subscriptions against other subscriptions and the supplier.
Answer:
when someone answers your questio correctly, you will see a red crown. Click on that and mark them the most brainiest
Explanation: