1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
babymother [125]
3 years ago
7

_____ is a method of computing that delivers secure, private, and reliable computing experiences based on sound business practic

es. Select one: a. Cloud computing b. Trustworthy computing c. Mobile computing d. Cluster computing
Computers and Technology
1 answer:
polet [3.4K]3 years ago
6 0

Answer:

The correct answer for the given question is option(B) i.e  Trustworthy computing.

Explanation:

Trustworthy computing delivers the reliable ,secure and private computing The main objective of Trustworthy computing is to provide the business integrity, security, reliability on sound business practices

Cloud computing storing and accessing the data from internet rather then hard drive so this option(a) is wrong.

Mobile computing accessing the data and information with the help of mobile device .It transfer the data over network with the help of mobile device ,so this option(c) is wrong.

Cluster computing is a collection of several computer to connect each other to  form single entity so this option(d) is wrong.

You might be interested in
Why is the cost of a software project not directly related to the cost of development?
DerKrebs [107]

Answer:On average, the cost of a robust custom software project will range between $50,000 and $250,000, although some sources say the price of a hypothetical mobile app built by a large development company may reach $1,000,000.

Explanation:

8 0
3 years ago
Three types of keys on the keyboard​
White raven [17]

Answer:

letter symbols numbers

Explanation:

6 0
3 years ago
Read 2 more answers
You can use tables for layout work. However, in XHTML, each form control should have its own ______ element
777dan777 [17]

Answer:

c. label

Explanation:

4 0
3 years ago
What are input masks most useful for in data validation? moving data from one field to another hiding parts of a value that are
tia_tia [17]

Answer:

Ensuring Consistent Formatting of Values in a Specific Field

Explanation:

6 0
3 years ago
Read 2 more answers
I have all of the points and brainliest, but it won't level up, I don't know why, anyone know why?
ozzi

Answer:

just refresh

Explanation:

you did level up i just checked, it just hasnt updated for you

8 0
2 years ago
Read 2 more answers
Other questions:
  • Which of the following is the largest disadvantage of hydropower?
    8·2 answers
  • What can be done to improve the security of business uses of the Internet? Give several examples of ecurity measures and technol
    9·1 answer
  • A difference between crt monitors and flat-panel displays is that most flat-panel displays use digital signals to display images
    8·1 answer
  • Which of the following involves writing hidden messages so that only the sender and intended recipient know a message exists? St
    5·1 answer
  • Air circulation is caused by ... A Earth's rotation around the sun B winds that move vertically C moving air between hot and col
    11·1 answer
  • At each layer of the OSI model, data is appended to the original message and then sent on to the next lower layer. What is this
    10·1 answer
  • Explain software piracy and Hacking​
    13·2 answers
  • HELP!!!
    15·2 answers
  • In what situations might you need to use a function that calls another function?
    11·1 answer
  • What is one way a pivottable could combine the following data?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!