1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
posledela
3 years ago
15

________ applications are software in which the vendor hosts the software online over the Internet and you do not to install the

software on your computer. Select one: A. Platform as a Service B. Software as a Service C. Infrastructure as a Service D. Open Source as a Service
Computers and Technology
1 answer:
Delicious77 [7]3 years ago
3 0

Answer:

B. Software as a Service

Explanation:

Software as a service (SaaS) is a cloud-based software in which the vendor hosts applications and make them available online for people to use without the need of installing them on their systems. Examples of Software as a service (SaaS) software include DocuSIgn, MailCHimp, Dropbox, BigCommerce, Salesforce etc.

You might be interested in
The application layer in the tcp/ip protocol suite is usually considered to be the combination of ________ layers in the osi mod
navik [9.2K]
Application Presentation and Session Layers.
8 0
3 years ago
How should you respond to the theft of your identity cyber awareness.
antiseptic1488 [7]

The way to respond to the theft of your identity cyber awareness is; To report the crime to the local commission which is the Federal Trade Commission (FTC).

<h3>Protection from Identity Theft</h3>

Identity Theft is basically a crime that happens happens when someone steals your personal information and uses it commit a fraudulent offence.

Now, the person that stole your identity may use the stolen information he got from you to apply for credit, file taxes, medical services or other government privileges.

The acts perpetuated above by the thief could lead to damage to your reputation with credit status and your good name too which could take years to rebuild.

Thus, it is very pertinent to report any case of such to the relevant government commission which in this case is Federal Trade Commission (FTC).

Read more about Identity Theft at; brainly.com/question/15252417

5 0
2 years ago
1. Very short questions.(any four) 14)<br>a. Write down the working principle of a computer.​
Oxana [17]

Answer:

The answer is below

Explanation:

Computer System is widely known for its ability to perform its functions faster by giving out information.

The computer system operation follows certain principles, some of which are:

1. It makes use of the OPERATING SYSTEM to link the hardware and the software together, without it, the computer system is useless.

2. It works with INPUT DEVICES such as keyboards or stylus. Without input devices, there is no way humans can communicate with the computer system

3. It works with OUTPUT DEVICES such as monitors and speakers. Without output devices, there is no way computers can communicate or give back information to humans.

4. It works with the NETWORK such as LAN or WIFI to provides the sharing of data files to other users or computers. Without the network, the computer system can only work within certain spaces, with no way to share data or files with others far away.

6 0
3 years ago
The power of if worksheet
sergejj [24]
What are you talking about?
3 0
3 years ago
An important part of the development of transport is safety. how can you, when you get around in different ways, contribute to m
nika2105 [10]

Answer:

I need help I don't get a this questions please asap?

Explanation:    Head-on collisions. Some simple solutions can help to reduce the risk of head-on crashes. ...

   Run-off road crashes. This is when a vehicle collides with a stationary object, such as a sign or lamppost, after leaving the road. ...

   Intersection crashes. ...

   Vulnerable road users. ...

   Much work to be done.

Aug 31, 2018

8 0
3 years ago
Other questions:
  • If there is no index.html file in the root folder nothing will be displayed when you navigate to the site address
    14·1 answer
  • Design a 4-bit register that can accept an input from the user and store the accepted input. The 4-bit register will operate in
    6·1 answer
  • When activated, an Excel object has all the features of an Excel
    8·2 answers
  • What is the top folder of the file tree called
    5·2 answers
  • What is green computing in non-technical term?​
    15·1 answer
  • Eight what makes one character
    14·1 answer
  • How do assignment article computer security, ethics and privacy?
    15·1 answer
  • Python: Bad input on line 8. What is the fix, please can someone tell me I’m desperate?
    10·1 answer
  • ________ is the art of manipulating people into breaking normal security procedures or divulging confidential information.
    12·1 answer
  • A network device that is used to connect multiple devices together without segmenting a network is a __________.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!