1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
babymother [125]
3 years ago
7

_____ is a method of computing that delivers secure, private, and reliable computing experiences based on sound business practic

es. Select one: a. Cloud computing b. Trustworthy computing c. Mobile computing d. Cluster computing
Computers and Technology
1 answer:
polet [3.4K]3 years ago
6 0

Answer:

The correct answer for the given question is option(B) i.e  Trustworthy computing.

Explanation:

Trustworthy computing delivers the reliable ,secure and private computing The main objective of Trustworthy computing is to provide the business integrity, security, reliability on sound business practices

Cloud computing storing and accessing the data from internet rather then hard drive so this option(a) is wrong.

Mobile computing accessing the data and information with the help of mobile device .It transfer the data over network with the help of mobile device ,so this option(c) is wrong.

Cluster computing is a collection of several computer to connect each other to  form single entity so this option(d) is wrong.

You might be interested in
Given the following method definitions: void mystery(double a) { System.out.print("double! "); } void mystery(int a) { System.ou
kicyunya [14]

Answer:

The correct answer to the following question is option "b".  

Explanation:

The method having the same name but the arguments have different so it is called method overloading. It is a part of the object-oriented programming language (oops).  

  • In the given code we define same method two times that is "mystery()". but in this method, we pass two different parameters. For the first time, we pass a double variable that is "a" as a parameter. In the second time, we pass an integer variable that is "a" as a parameter and in both functions, we write some codes.
  • In the calling time, we call function two times. In first time calling we pass an integer value that is "1" and second time calling we pass double value that is "1.0". So the output of this code is "int! double!".  

That's why the option "b" is correct.

6 0
3 years ago
A user logs in to a virtual world and creates an animated character representing themselves, which they then use to move through
Romashka [77]

A type of animated character that represents a user in the virtual world, which is used to move throughout the world and interact with other characters and objects is called an <u>avatar</u>.

<h3>What is an avatar?</h3>

An avatar can be defined as a type of animated character that is designed and developed by a software developer to represent a user or player in the virtual world, which is used to move throughout the world and interact with other characters and objects.

In gaming technology and software development, an avatar is typically used to denote a user's (player's) character in the gaming world, virtual world or computer-simulated environment, either in two-dimensional (2D) or three-dimensional (3D).

Read more on avatar here: brainly.com/question/26479902

4 0
2 years ago
Read 2 more answers
Joseph wants to take out the color of the background wall from an image what can Joseph do to achieve this​
snow_lady [41]

Answer:

Go to remove a background website

Explanation:

6 0
2 years ago
Read 2 more answers
Which of the following is NOT a popular computer programming
cestrela7 [59]
Answer is Xero. All the other Languages are Popular and Widely Used.
Thank You!
6 0
2 years ago
When I click on someone who asked a question and i want to see there answer it is always blurred and when I asked a question I c
yuradex [85]

Answer:

If your on pc like me use ad blocker I do that but otherwise watch the add press ok after if it dosemt work tell me I’ll try and find you it and for ad blocker you also can have a jailbreak divice and to get and blocker go to chrome extension website search up pop up ad blocker

Explanation:

7 0
3 years ago
Other questions:
  • What is my credit card billing zip code??
    15·1 answer
  • A ________ is a virus that is triggered on a certain date.
    11·1 answer
  • Two different ways to bring up My Computer folder
    11·1 answer
  • What will be the value of x after the following code is executed? int x = 10; do { x *= 20; } while (x &lt; 5); A. 10 B. 200 C.
    14·2 answers
  • What is the primary difference between 3g and 4g cellular systems? 4g systems have greater transmission speeds. 3g systems are u
    5·1 answer
  • How many nibbles make one kilobyte​
    7·2 answers
  • 8. A sprite is a simple spider shaped thing with n legs coming out from a center point. The angle
    10·1 answer
  • Determine whether or not the following pairs of predicates are unifiable. If they are, give the most-general unifier and show th
    13·1 answer
  • My laptop volume has got really low all of a sudden. It wasn't the best to start with but now i can barely even hear it at 100%.
    10·1 answer
  • To specify your preferred colors, fonts, and effects for a document, which of the following should be done?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!