1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jenyasd209 [6]
3 years ago
14

Because it allows their files to be accessed from any device on the Internet, many users like to back-up their files using ___ s

torage.
Computers and Technology
1 answer:
77julia77 [94]3 years ago
3 0

Answer:

Cloud

Explanation:

Cloud computing is a central form of storing data on a data center, provided online, to provides inexpensive and secure storage facilities and central accessing of document, using any device and accessing the data from anywhere and time.

Data stored in a clients computer system, would have to be transferred to another remote computer by using a portable storage, to share data. Using a cloud service or a database center service, a document can be accessed by a group of users at the same time, in different places, and assures a secure data in the database.

You might be interested in
Which is considered the best way to secure a laptop to a desk in a workplace?
Lorico [155]

Answer:

Lock it in a safe is the best way to secure a  laptop to a  desk in a work space.

Explanation:

Since the end user feels that a laptop can be stolen or taken by others is a safe way to keep hire or her laptop in a  safe place.

Bolt  it:-  it is  not possible, because there   is  no   option available

Lock  it is safe:- this  is  idle or best  solution is  safe his or her laptop

Use an alarm :- the person   who steals the laptop will be more intelligent and he or she knows how to disable the alarm system.

Use  cable lock;- it is easy to remove it.

3 0
3 years ago
âwhat service uses a private cloud in conjunction with a web browser or downloaded client software to access desktop software?
Vera_Pavlovna [14]
<span>The answer should be: Virtual Desktop Infrastructure</span>
5 0
4 years ago
Find the value of 1/2 of 1/2​
sveta [45]

Answer:

1/2 of 1/2​ is 1/4 <em>or </em>0.25

Explanation:

7 0
3 years ago
Read 2 more answers
A zipped folder is indicated by a
stiv31 [10]
C. Little zipper on the outside of the folder.
4 0
3 years ago
What is not an example of ai
BARSIC [14]

Answer:

human

Explanation:

because it is not a machine

8 0
3 years ago
Read 2 more answers
Other questions:
  • A network engineer arrives at work and discovers that many users are having problems when attempting to connect to the company n
    9·2 answers
  • In networking, what addressing type is used in sending an email to someone?
    6·1 answer
  • Which view of data deals with how the data is actually formatted and located? physical view logical view information view techni
    12·1 answer
  • What method does a GSM network use to separate data on a channel?
    15·1 answer
  • Microsoft's Xbox operating system provides Xbox programmers with a set of common standards to use to access controllers, the Kin
    15·1 answer
  • 25 points!!!!!!!!!!!!!!!!!!!!!
    9·2 answers
  • Which is an advantage of a computer network?
    7·2 answers
  • Type the correct answer in each box. Spell all words correctly.
    12·1 answer
  • This class is missing a number of functions. Rewrite the class declaration to follow best practices, e.g, operators, three impor
    10·1 answer
  • The TCP/IP stack has five layers, namely application, transport, network, link, and physical.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!