1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
qwelly [4]
4 years ago
15

Give two reasons why cloud computing could be detrimental to a company.

Computers and Technology
1 answer:
dimulka [17.4K]4 years ago
3 0

Security/Insider threats.

As much as cloud computing is good for your organization, just know that someone is looking after your data. The cloud provider does everything for you from maintenance to managing security. The bigger picture here is that users are entrusting their data to someone else. Although the work of cloud providers is to ensure that your data is safe, some are not always looking after your best interests.

Cyber-attacks.

Any time your data is stored on the cloud, you are at a higher risk of cyber-attack. Vulnerabilities such as DDoS attacks might occur and this single point of failure is in the cloud. As cloud computing continues to become more sophisticated, so do cyberattacks. As much as the security is right, hackers will go to any lengths to penetrate the systems.  


You might be interested in
Mingji is working to transfer photos from her digital camera to her computer. While
MAVERICK [17]

Answer:

digital camera with bluetooth

Explanation:

Bluetooth is defined as a wireless technology with the help of which data and information such any images, documents, files, etc can be send to other devices equipped with bluetooth technology over a short distance with the use of UHF radio waves.

Bluetooth technology help in exchanging data with out the use of a USB cable.

In the context, Minji is having a digital camera with bluetooth technology as she can transfer her photos from the camera to the computer with out the help of any USB chord.

4 0
3 years ago
Danielle, a help desk technician, receives a call from a client. In a panic, he explains that he was using the Internet to resea
marysya [2.9K]

Answer:

The customer's browser has been hijacked by some attackers may be.

Explanation:

According to customer's explanation there is  possibility that that his data may be stolen and he has to disconnect computer from network and then call given number in order to get back his data.

5 0
3 years ago
Rachelle is writing a program that needs to calculate the cube root of a number. She is not sure how to write the code for that
Dmitriy789 [7]

The cube root is a number multiplied by itself three times to get another number

The code to use is y = x**(1/3)

<h3>How to determine the code to use</h3>

Assume the variable is x, and the cube root of x is y.

So, we have the following equation

y = x^\frac13

In Python, the code to use is y = x**(1/3)

Hence, the code that Rachelle can use in her calculation is x**(1/3)

Read more about cube roots at:

brainly.com/question/365670

3 0
2 years ago
Read 2 more answers
Determine of population size​
damaskus [11]

Answer:

there a 7 billion of people as of 2015 census

3 0
3 years ago
You are in charge of an event at work. You want to plan and schedule events and resourse. What type of software should you use?
Sav [38]

project management... we use this software to plan and schedule event and resources.

3 0
3 years ago
Read 2 more answers
Other questions:
  • . What may happen if a large number of computer users are attempting to access a Web site at the same
    10·2 answers
  • What does the picture indicate on the famous book “Dawn of the century”?​
    10·1 answer
  • Selecting the option to control Widows and Orphans will prevent _________. A single line from appearing at the top or bottom of
    10·1 answer
  • Which of the following is NOT true about RMI? RMI uses the socket connection, including opening and closing the socket. RMI allo
    8·1 answer
  • You can apply several different worksheet themes from which tab?
    10·2 answers
  • Technologies have advanced to allow computer chips to be placed in almost anything and to be connected to a network almost anywh
    8·1 answer
  • Select the guidelines you should follow when creating a resume
    12·2 answers
  • A business traveler notices there is an extra connector between the keyboard and the computer, in a business center. She has mos
    12·1 answer
  • HURRY!!!!!!!!!!!!!
    15·1 answer
  • Listed here are a few camera angles and their images.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!