1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
max2010maxim [7]
3 years ago
9

When was the idea of the cloud first developed? 2000s 1990s 1960s 1980s

Computers and Technology
1 answer:
kondaur [170]3 years ago
5 0

Answer:I would say 1980 is the answer or The answer is B 1980.

You might be interested in
Which option describes the purpose of configuring native supplicant profile on the cisco ise?
Ulleksa [173]

The best option describes the purpose of configuring Native Supplicant Profile on the Cisco ISE is it enforces the use of MSCHAPv2 or EAP-TLS for 802.1X authentication.

8 0
3 years ago
White meat and dark meat fish have slightly different nutritional characteristics. What are the nutrition characteristics of dar
Marina CMI [18]

The nutrition characteristics of eating darker meat of fish like Salmon are that it is higher in healthy Omega-3 fats. It is true, however, that as much as it has the highest Omega-3 fats, it is also likely to be highest in any potential toxins.






7 0
3 years ago
Read 2 more answers
Someone learn me more American Sign Language (ASL). Please.
sveticcg [70]

Answer:

Ok I will

Explanation:

3 0
3 years ago
Which encryption standard uses Advanced Encryption Standard (AES), a 128-bit block cipher that is much tougher to crack than the
Alchen [17]

Answer:

Wi-Fi Protected Access 2 (WPA2)

Explanation:

The Wi-Fi Protected Access 2 (WPA2) makes some alterations to the encryption algorithm that were used in WPA and WEP to what is known as the  Advanced Encryption Standard (AES). This is a 128-bit block cipher considered to be much more difficult to crack than the usual 128-bit TKIP wrapper. However, although WPA2 offers a much more tougher encryption standard, it is important to note that it is not hack proof.

5 0
3 years ago
You can send emails to individuals from your address book.<br><br> True<br> False
MAXImum [283]
I believe the answer is False or I may be wrong
5 0
3 years ago
Other questions:
  • The file containing the definitions of the member functions of class DateType is called the ______ file.
    6·1 answer
  • Writenames of eight output device.​
    8·1 answer
  • Write a function M-file that takes as input two matrices A and B, and as output produces
    8·1 answer
  • To delete a database object, right-click the object in the Navigation Pane and then click ____ on the shortcut menu.
    15·1 answer
  • Which program can damage your computer
    13·2 answers
  • Which of the following should you NOT do when using CSS3 properties to create text columns for an article element? a. make the c
    12·2 answers
  • 9. The voltage of a replacement capacitor must
    11·1 answer
  • PLS HEEELLLP ASAP, DONT JOKE
    9·2 answers
  • Answered
    10·1 answer
  • DUE SOON NEED HELP FAST!!
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!