1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dezoksy [38]
3 years ago
7

The ______ cloud service model provides virtual environments online that can be tailored to the needs of developers

Computers and Technology
1 answer:
Ratling [72]3 years ago
3 0
Internet cloud service that could be accessed by other devices with a certain password
You might be interested in
Provide examples of how information technology has created an ethical dilemma that would not have existed before the advent of I
Kamila [148]
Hrhdhhdhdjhdhcnbcgfgbsbnenwnsn

7 0
3 years ago
What is the difference in adware and spyware
Katarina [22]

Generally speaking, adware is a program that installs an additional component that feeds advertising to your computer, often by delivering pop-up ads or by installing a toolbar in your browser.

Some adware may hijack your browser start or search pages, redirecting you to sites other than intended. Unless you're a fan of guerrilla marketing, such tactics can be annoying. Worse, the mechanism that feeds the advertising can introduce system anomalies or incompatibilities that cause problems with other programs and can even disrupt the functioning of the operating system.

Spyware surreptitiously monitors your computer and internet use. Some of the worst examples of spyware include keyloggers who record keystrokes or screenshots, sending them to remote attackers who hope to glean user IDs, passwords, credit card numbers, and other sensitive information.

Most often, though, spyware takes a more benign but still quite offensive form. The information gathered, often referred to as "traffic data," can consist of monitoring the websites visited, ads clicked, and time spent on certain sites. But even in its more benign form, the collected data can morph into something far more insidious.

Hope this helped.. ;D

3 0
3 years ago
Read 2 more answers
Object Material: metal or non-metal? Prediction: Will the light bulb light up? Morm Observation: Does the light bulb light up? n
Mandarinka [93]

Answer:

it would be nail key

Explanation

mainly cuz i went to college ad it makes sense ause mettal and metal yw:)

4 0
3 years ago
Susan is creating a spreadsheet, and she needs to enter the months of the year in column A. Susan should _____.
AysviL [449]
Enter January in A1 hold mouse in bottom right hand corner of cell. Hold mouse button down and drag the mouse. Excel will populate the months of the year
3 0
3 years ago
Read 2 more answers
________ refers to the ICT architecture, where users access software applications and information systems remotely over the Inte
Slav-nsk [51]

Answer:

Cloud computing

Explanation:

Cloud computing refers to the process of making computer system resources like computing power and data storage available to user on-demand without requiring the user to manage them himself. The computer system resources include servers, applications, networks, services, storage, and others.

It allows data center to be available over the internet to a large number of users.

Cloud computing involves employing a network of remote servers which are hosted on the Internet for processing, storing, and managing data, instead of using a personal computer or a domestic server. Its aim is to ensure a coherence and economies of scaled through resources sharing.

There are two types of cloud computing: enterprise clouds, which its use can be restricted to just one organisation; and public cloud, which is meant for many organisation.

3 0
3 years ago
Other questions:
  • Ascending and descending are examples of
    5·2 answers
  • Which of these decisions would u most likely make on ur own
    8·2 answers
  • Prove, using mathematical induction, that the given property of the Fibonacci numbers is true [F(n+1)]2 =[F(n)]2+F(n−1)∗F(n+2) f
    5·1 answer
  • Five batch jobs. A through E, arrive at a computer center at almost the same time. They hav e estimated running times of 10, 6,
    14·1 answer
  • M f2.app.edmentum.com
    5·1 answer
  • Edhesive 1.7 code practice question 1
    8·1 answer
  • What is the central idea of the second section:
    14·1 answer
  • We _____to separate the code in sub programs from the main code<br><br> Please help!!
    10·2 answers
  • What are the steps to complete an internet search?
    6·1 answer
  • Project: Digital Media and Business
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!