1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
babymother [125]
3 years ago
7

_____ is a method of computing that delivers secure, private, and reliable computing experiences based on sound business practic

es. Select one: a. Cloud computing b. Trustworthy computing c. Mobile computing d. Cluster computing
Computers and Technology
1 answer:
polet [3.4K]3 years ago
6 0

Answer:

The correct answer for the given question is option(B) i.e  Trustworthy computing.

Explanation:

Trustworthy computing delivers the reliable ,secure and private computing The main objective of Trustworthy computing is to provide the business integrity, security, reliability on sound business practices

Cloud computing storing and accessing the data from internet rather then hard drive so this option(a) is wrong.

Mobile computing accessing the data and information with the help of mobile device .It transfer the data over network with the help of mobile device ,so this option(c) is wrong.

Cluster computing is a collection of several computer to connect each other to  form single entity so this option(d) is wrong.

You might be interested in
In three to five sentences, describe how technology helps business professionals to be more efficient. Include examples of hardw
Natali5045456 [20]
Technology helps business professionals, keep more organized, communicate better, and effectively keeps businesses secure. Technology helps keep employee information and business paper<span> work more organized using</span>computers<span> and </span>software<span>; while making it easier to communicate with employee's using e-mail and memo's. With better alarm systems, camera's and online banking, security measures are endless. </span>
4 0
3 years ago
Why did the boy run from the pillow...... wrong answers only
Savatey [412]

He thinks there is a demon hiding innit thus, he runs and calls his mom. His mom says "Jimmy there's nothing in that pilow young man!" Jimmy walks back to his room scared if its still there. He hops into bed hoping that he can get a good nights rest. The next day, Jimmy asks if he can go buy another pillow. His mom says "As long as it makes you feel safe then ok." Young Jimmy, jumping in excitement, goes to the checkout zone to buy his new pillow. When they get home, Jimmy and his mom eat dinner and then head for bed. Jimmy hops into bed and knows that everything will be ok. The end.

4 0
2 years ago
Please help me on this I don't know which one they are​
Nutka1998 [239]
Hi, the photo doesn’t show the question on what to answer, all I see are empt boxes, if you message me the question I will answer it for you!
7 0
3 years ago
Read 2 more answers
PLEASE HELP ME I WILL GIVE BRAINIEST AND 40 POINTSPython Project Worksheet
Paha777 [63]

Answer:

i can only give you pseudocode my fren

Explanation:

# information about me

def main():

MyName =  “malaki”

print(myName)

myInfo = “I was born in wichita, Kansas U.S. I live in japan. I love hotdogs.”

print(myInfo)

main()

sorry if this did not help :( i tried

6 0
2 years ago
Joshua wants to be a lawyer. He found the following table on the Bureau of Labor Statistics’ website to find out about the emplo
mars1129 [50]

The answer to your question is,

C) The number of lawyers will increase, so it may be difficult to find a job.

-Mabel <3

3 0
3 years ago
Read 2 more answers
Other questions:
  • Below is a chart representing portions of resumes from 3 applicants. Which best explains the applicants careers?
    11·1 answer
  • Which type of denial of service attack exploits the existence of software flaws to disrupt a service?
    12·1 answer
  • What do u say to your bf if he says sayy lesssss
    14·2 answers
  • What is the missing line of code?
    10·2 answers
  • What is the location used by users to configure delegate access on their own mailboxes?
    14·2 answers
  • ¡Hola! He visto en muchos comentarios de Twitter "svd" cuando alguien dice "dale fav a este Tweet y siganse entre ustedes" y en
    8·1 answer
  • Can someone write this in java? Also, does anyone know how to do Edhesive assignments?
    15·1 answer
  • One of 34 possible _________________ can be assigned to each axis of classification in the seven-character code.
    12·1 answer
  • The following code appears in a sort function. Will this function sort in increasing order (smallest first) or decreasing order
    5·1 answer
  • A(n) __________ is a computer that presents itself as a sweet, tempting target to a hacker but, in reality, is a decoy
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!