1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
qwelly [4]
4 years ago
15

Give two reasons why cloud computing could be detrimental to a company.

Computers and Technology
1 answer:
dimulka [17.4K]4 years ago
3 0

Security/Insider threats.

As much as cloud computing is good for your organization, just know that someone is looking after your data. The cloud provider does everything for you from maintenance to managing security. The bigger picture here is that users are entrusting their data to someone else. Although the work of cloud providers is to ensure that your data is safe, some are not always looking after your best interests.

Cyber-attacks.

Any time your data is stored on the cloud, you are at a higher risk of cyber-attack. Vulnerabilities such as DDoS attacks might occur and this single point of failure is in the cloud. As cloud computing continues to become more sophisticated, so do cyberattacks. As much as the security is right, hackers will go to any lengths to penetrate the systems.  


You might be interested in
Solid state storage stores data in erasable, rewritable circuitry, rather than on spinning disks, tape, or optical media.
Gwar [14]
It’s true because it’s also called “flash memory”
7 0
4 years ago
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
• Bài 5: Cho cạnh a, b và c như hình sau. Tính diện tích hình được tô màu. Biết b là đường kính của nữa hình tròn. Xác định bài
umka21 [38]

Answer:

huh?

Explanation:

what I don't understand

5 0
3 years ago
16. The process of using a computer to write, design, and assemble documents is called
julia-pushkina [17]
It is called D. destkop pulishing
With desktop publishing, people will had the options to choose a certain layout from the destkop publishing software that allow them to create high quality document in shorter period of time. This software allow individuals to publish on their own without the need of printing press.
3 0
3 years ago
Read 2 more answers
To use a resource from a module, you write the name of the module as a qualifier, using which symbol before the name of the reso
Sladkaya [172]

Answer:

d. .

Explanation:

Dot (.) symbol is used to access the resource from the module. It is used to establish the connection between resource and module.

While on the other hand "=" is an assignment operator that is used to assign a value to the variable. "*" is use for the purpose of multiplication of two values in variables. Double Inverted commas ("") used to print the statement written between them.

7 0
3 years ago
Other questions:
  • Operating systems that have windows and icons have which type of user interface?
    15·1 answer
  • A java program that calculates the balance of three months of $1000 and interest rate 6%
    9·1 answer
  • Explain Spreadsheet and its Basics
    13·1 answer
  • A ? is the desired value where a process should be maintained. The value may be manually set, automatically set, or programmed.
    13·1 answer
  • Which pane is used to modify the actual content of the SmartArt graphics as opposed to the layout and design?
    8·1 answer
  • What feature did the 32X add to the Sega Genesis?
    14·2 answers
  • 10. Why antivirus is needed to be installed in computer system?
    8·1 answer
  • Write javascript code for the form that appears in the image below. you are expected to add validation to the name field, email
    10·2 answers
  • The choice of database does not have any impact on the relevancy of search results?
    13·1 answer
  • All character entities end with _____ to signal the browser that everything in between is an entity representing a symbol.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!