1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jenyasd209 [6]
3 years ago
14

Because it allows their files to be accessed from any device on the Internet, many users like to back-up their files using ___ s

torage.
Computers and Technology
1 answer:
77julia77 [94]3 years ago
3 0

Answer:

Cloud

Explanation:

Cloud computing is a central form of storing data on a data center, provided online, to provides inexpensive and secure storage facilities and central accessing of document, using any device and accessing the data from anywhere and time.

Data stored in a clients computer system, would have to be transferred to another remote computer by using a portable storage, to share data. Using a cloud service or a database center service, a document can be accessed by a group of users at the same time, in different places, and assures a secure data in the database.

You might be interested in
In addition to developing sketches, computer-aided design programs are used by fashion designers to perform which task?
nikdorinn [45]

Answer:

flat drawing, pattern making development, computerized marker planning and many other fashion designing related aspects.

Explanation:

6 0
2 years ago
If you are trying move a hard drive from a non-working computer to a working computer for the purposes of accessing the data on
Llana [10]
You must have an administrator password before you can access the drive <span />
5 0
3 years ago
Write Python algebraic expressions corresponding to the following statements: (a) The sum of the first five positive integers (b
lbvjy [14]

Answer:

#part a

#sum of first 5 positive number

Sum=5*(5+1)/2

print("sum of first 5 positive integer is: ",Sum)

#part b

# declare age of all

Sara_age=23

Mark_age=19

Fatima_age=31

ave_age=(Sara_age+Mark_age+Fatima_age)/3

print("average age of Sara,mark and Fatima is: ",ave_age)

#part c

#find number of times

no_of_times=int(403/73)

print(" number of times when 73 goes into 403 is: ",no_of_times)

#part d

#find remainder

rem=403%73

print("when 403 is divided by 73 then remainder  is: ",rem)

#part e

#calculate 2 to pawer 10

two_pow=2**10

print("2 to power  10 is: ",two_pow)

#part f

#declare height of both

sara_h=54

mark_h=57

diff_h=abs(sara_h-mark_h)

print("The absolute difference between height of Sara and Mark is: ",diff_h)

#part g

#find the minimum among three

print("lowest price among the three($34.99,$29.95,$31.50) is: $",min(34.99,29.95,31.50))

Explanation:

In part a, sum of first 5 positive number is calculated as 5*(5+1)/2.In part b, add the age of three and divide it  by 3. In part c, use "/" to find number of times 73 goes into 403.In part d, use "%" to find remainder when 403 is divide by 73.In part e, 2 to the 10th power is calculated as 2**10.In part f, use abs() to find the absolute  difference.In part g, min() function is used to find lowest among the 3 prices.

Output:

sum of first 5 positive integer is:  15.0                                                                                  

average age of Sara,mark and Fatima is:  24.333333333333332                                                                

number of times when 73 goes into 403 is:  5                                                                              

when 403 is divided by 73 then remainder  is:  38                                                                          

2 to power  10 is:  1024                                                                                                  

The absolute difference between height of Sara and Mark is:  3                                                            

lowest price among the three($34.99,$29.95,$31.50) is: $ 29.95

5 0
4 years ago
Programs for embedded devices are often written in assembly language. Some embedded processors have limited instructions, like M
oksano4ka [1.4K]

Answer:

#include <iostream>

using namespace std;

int main()

{

   char address[2];

   int tag, firstBit, secondBit, setNumber;

   int cache[4][2]={{1,5}, {2,4}, {3,2}, {6,0}};

   cout << "Enter the address as hex(in small letters: "<

   cin >> address;

   for (int i < 0; i < 8; i++){

       if (address[0] == '0'){

           tag = 0;

           firstBit = 0;

        } else if (address[0] == '1'){

           tag = 0;

           firstBit = 1;

        } else if (address[0] == '2'){

           tag =1;

           firstBit = 0;

        } else if (address[0] == '3'){

           tag = 1;

           firstBit = 1;

        } else if (address[0] == '4'){

           tag = 2;

           firstBit = 0;

        } else if (address[0] == '5'){

           tag = 2;

           firstBit = 1;

        }  else if (address[0] == '6'){

           tag = 3;

           firstBit = 0;

       } else if (address[0] == '7'){

           tag = 3;

           firstBit = 1;

       }  else if (address[0] == '8'){

           tag = 4;

           firstBit = 0;

       } else if (address[0] == '9'){

           tag = 4;

           firstBit = 1;

       }   else if (address[0] == 'A'){

           tag = 5;

           firstBit = 0;

       } else if (address[0] == 'B'){

           tag = 5;

           firstBit = 1;

       }  else if (address[0] == 'C'){

           tag = 6;

           firstBit = 0;

       } else if (address[0] == 'D'){

           tag = 6;

           firstBit = 1;

        }  else if (address[0] == 'E'){

           tag = 7;

           firstBit = 0;

       } else if (address[0] == 'F'){

           tag = 7;

           firstBit = 1;

       } else{

           cout<<"The Hex number is not valid"<< endl;

        }

   }

   if(address[1]>='0' && address[1]<'8'){

       secondBit = 0;

  }  else if(address[1]=='8'|| address[1]=='9'||(address[1]>='a' && address[1]<='f')){

       secondBit = 1;

   }  else{

       cout<<"The Hex number is not valid"<< endl;  

       return 0;

   }

   setNumber = firstBit * 2 + secondBit;

   if(cache[setNumber][0]==tag || cache[setNumber][1]==tag){

       cout<<"There is a hit";

   } else{

       cout<< "There is a miss";

   }

   return 0;

}

Explanation:

The C++ source code prompts the user for an input for the address variable, then the nested if statement is used to assign the value of the firstBit value given the value in the first index in the address character array. Another if statement is used to assign the value for the secondBit and then the setNumber is calculated.

If the setNumber is equal to the tag bit, Then the hit message is printed but a miss message is printed if not.

4 0
3 years ago
How are &lt; embed &gt; tags used in web page creation?
yKpoI14uk [10]

Answer:

The <embed> HTML element embeds external content at the specified point in the document. This content is provided by an external application or other source of interactive content such as a browser plug-in.

Explanation:

7 0
2 years ago
Other questions:
  • Which of the following is not an algorithm?
    8·1 answer
  • Do you think engineers have to adapt their original plans during the construction of systems or products? Why might they?
    6·1 answer
  • Truncation is a keyword search technique that helps you find useful variations of a term or terms. You want to find books on the
    5·1 answer
  • What is the exact number of bits in a memory that contains (a) 128k bits?
    9·1 answer
  • There are a multitude of items that Cyber Security professionals view as attack vectors but none are more prevalent and exploita
    13·1 answer
  • MS Excel is a powerful spreadsheet program that helps people with complex mathematical calculations. In what ways could you use
    10·1 answer
  • Someone gave me flashcards on a keychan. I have to memorize them and then give them back. Can I back them up to my PC by creatin
    5·1 answer
  • HELP THIS IS SO DIFFICULT
    10·2 answers
  • A type of attack where the adversary intercepts network packets, modifies them, and inserts them back into the network is called
    13·1 answer
  • Similarities between master file and reference file
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!