1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paraphin [41]
3 years ago
6

what is a massive online storage that allows for Access by any internet-connected device running web browser. use for Less priva

te files ​
Computers and Technology
1 answer:
Paladinen [302]3 years ago
8 0
I recommend Google Drive, it allows up to 15gb of free storage. You can access it anywhere since it is fromGoogle. Another one you can try is Dropbox which only allows up to 2gb.
You might be interested in
Scanner can be used to read tokens from a String literal Scanner can be used to read tokens from the console window (user input)
Paladinen [302]

Answer:

Scanner can be used to read tokens from the console window (user input)

Explanation:

Scanner is a class used in some programming languages to obtain inputs from users.

It is mostly well developed in Java programming language and used exclusively for taking and obtaining inputs.

Scanner takes input in primitive types such as doubles, floats and integers. IT also takes string inputs.

Here is a code snippet where the class scanner is used:

         Scanner input = new Scanner (System.in)

The code above creates an object of the scanner class

7 0
4 years ago
Computing devices translate digital to analog information in order to process the information
valentina_108 [34]

Answer:

True?

Explanation: is IT RIGHT?????????????????

6 0
3 years ago
Which Definition Best describes Technology as it Is Used in Science
Juli2301 [7.4K]

Answer: the best explanation that describes that application of technology in science is the application of new methods or devices to solve problems The definition of technology is science or knowledge put into practical use to solve problems or invent useful tools.

Explanation:

5 0
4 years ago
Read 2 more answers
Meera has created a small program in Python. She wants to store elements of the same data type in an organized
blondinia [14]

Answer:

NumPy contains a large number of various mathematical operations.

...

Numpy | Mathematical Function.

Function Description

expm1() Calculate exp(x) – 1 for all elements in the array.

exp2() Calculate 2**p for all p in the input array.

log10() Return the base 10 logarithm of the input array, element-wise.

log2() Base-2 logarithm of x.

4 0
3 years ago
A(n) _____ is a network attack in which an intruder gains access to a network and stays undetected with the intention of stealin
Archy [21]

Answer:

Advanced persistent threat (APT)

Explanation:

The above is defined as follow.

Advanced

The attacker uses advanced technological utilities to enter the network and remain unidentified.

Persistent

The attacker upon entering the network, remains focused on the given task, i.e., establishing back door throughout the network by utilizing malware.

Threat

This is both a threat and an attack. The threat to information and an attack since unwanted infrastructure is installed by the attacker.

In this type of attack, the hacker ( or unauthorized party ) manages to access the network. The presence of the hacker is not known, and the hacker remains hidden. The sole reason for this attack is to gain access to the data and not disrupting the network or the organization.

This type of attack is a major threat to organizations involved in security, financial transactions and production industry.

The hacker leaves the network once the hacker gets hold of the information. The hacker enters and exits the network quickly to avoid being noticed.

The hacker enters the network through legitimate way. Next, the hacker manages to acquire login information of an authorized user. As and when the hacker can move across the network using the login of another authorized user, the hacker begins creating the back door. The back doors established by the hacker help in exiting the network.

The above cycle is carried on until the hacker remains unidentified.

This is a unique and more dangerous threat since the attacker remains unidentified for a long period of time. In this duration, the attacker records the information easily.

APT Mitigation

Traditional security mechanisms prove ineffective in combating with APT. Due to varied types of malware software, it is not easy to detect APT. This makes the protection from APT somewhat difficult.

Deep analysis of the network activities and highly sophisticated security mechanism can help mitigate APT.

7 0
4 years ago
Other questions:
  • Mitchell is assisting her teacher in a project by entering data into the spreadsheet. Which types of data can Michelle enter in
    14·2 answers
  • ​ A wire service is also known as a ____.
    7·1 answer
  • Tara is using new software for the first time and wants help learning how to
    15·1 answer
  • What the repeal of online privacy protections means for you?
    8·1 answer
  • Suppose host A is sending host B a large file over a TCP connection. If the sequence number for a segment of this connection is
    8·1 answer
  • When a single physical computer runs this type of software, it operates as though it were two or more separate and independent c
    6·1 answer
  • In Python please:
    14·1 answer
  • Write a class that specify the characteristics of a car, like type (sedan, jeep, mini, SUV, etc), gear (auto, manual), maximum s
    12·1 answer
  • Internet transportation exchanges brings together shippers who post __________ and carriers that post __________ in order to arr
    11·1 answer
  • What is the number base of the binary number system?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!