1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GREYUIT [131]
3 years ago
9

_____________ describes the abstraction of web-based computers, resources, and services that system developers can utilize to im

plement complex web-based systems.A. VirtualizationB. ScalablityC. Cloud computingD. Portability
Computers and Technology
1 answer:
marissa [1.9K]3 years ago
8 0

Answer:

Option A.

Explanation:

You might be interested in
(--BRAINLIEST--)<br>Explain the types of secondary memory on the basis of data access.​
Nina [5.8K]

There are two types of secondary memories.

  1. RAM
  2. ROM

RAM:

  • RAM stands for random access memory .
  • It is expandable.
  • we can do multiple things in it.
  • Its erasable.

ROM

  • ROM stands for read only memory.
  • It is permanent .
  • We can only read in it.
  • Its permanent hence not removable.
8 0
3 years ago
Read 2 more answers
How can you encrypt and decrypt a message in cryptography
ser-zykov [4K]
There are two main types of encryption - <span>symmetric and asymmetric. 

Using symmetric encryption, you use a single secret key that is used to both encrypt and decrypt the data. This form of encryption has been used way before computers! Without this key it is very hard to decrypt a message. However, the issue with this is that if you want to send an encrypted message, you also have to send a key to them, and </span>if your somebody unintended intercepts the key, they can read the message.

What's the solution? Asymmetric cryptography or public key encryption. Asymmetric cryptography uses encryption that splits the key into two smaller keys. One of the keys is public and one is kept private. A good metaphor for understanding this is the public key is the lock, and the private key is the key. You can encrypt a message to send to somebody with their public key, locking it, which they can then decrypt, unlock, with their private key. And vice versa. So with this kind of encryption it's very difficult to decrypt a message for anybody but the owner as it's much harder to steal when it doesn't need to leave their computer, but easy to encrypt messages to send to them

5 0
3 years ago
The ________ is a system of interlinked documents on the Internet, or a graphical user interface to the Internet that provides u
RSB [31]

Answer:

World Wide Web (WWW)

Explanation:

Popularly referred to as the Web is an information system that comprises of many interconnected web resources and documents. These documents and web resources possess a certain URL (Uniform Resources Locators) such as https://www.brainly.com/ which makes them accessible over the internet.

The <em>HTTP or Hypertext Transfer Protocol</em> is a channel for transferring the resources of the World wide web among users.

In 1989, the World Wide Web was invented by Tim Berners-Lee. He developed the first web browser in 1990.

The World Wide Web has played a fundamental role in the advancement of the information age as it is greatly used by different people around the world to communicate efficiently.

6 0
3 years ago
Can you guys help me with this coding assignments?
kicyunya [14]

Explanation:

x ==50

while x< 100;

x -= 1

8 0
3 years ago
What technological invention allowed for the prevalence of automation
julsineya [31]
The automated flour mill created by Oliver Evans in the mid-1780’s?
8 0
3 years ago
Read 2 more answers
Other questions:
  • What project started the development of inter-network connections using tcp/ip that has evolved in to the internet today
    13·1 answer
  • To use the Web, each client computer requires a data link layer software package called a Web browser. True False
    8·1 answer
  • The trade winds are the dominant surface winds from the subtropics to high latitudes. 1. True 2. False
    7·1 answer
  • What is the function of napier's bones<br>​
    8·1 answer
  • What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typic
    14·1 answer
  • Sandra is having difficulty with her reading assignment because she does not fully understand the language. Which online tool wo
    6·1 answer
  • The fact that the impact of changes in the elements making up an IT (software) project are not proportional or intuitive is rela
    5·1 answer
  • Difference between primary key and foreign key
    12·1 answer
  • Is this statement true or false?
    5·1 answer
  • UPS or FedEx plays what role in the supply?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!