1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flura [38]
3 years ago
13

________ is a model of computing in which firms and individuals obtain computing power and software applications over the intern

et, rather than purchasing and installing it on their own computers.
a. client/server computing
b. p2p computing
c. mobile computing
d. cloud computing
Computers and Technology
1 answer:
Irina-Kira [14]3 years ago
4 0
Pretty sure the answer is A.
You might be interested in
What is a good safety precaution to take when opening a computer case?
Anna11 [10]

Answer:

Place tape over the case edges that are sharp

6 0
3 years ago
We can include following item(s) during configuration itemidentification:
Ainat [17]

Answer:

d) All of the above

Explanation:

In configuration management, the Identify configuration items, work products and related components are present.

  • All the documents which are related to the work,the manuals how that the system works are present in the configuration item identification.
  • The source code that is implement for the functioning of the products.These are implemented at the time of generation of products.
  • Software Requirement Specifications are also specified by SRS it is present in design stage of software development life cycle,it is also a part of configuration item identification.
5 0
3 years ago
What is the least number of bits you would need to borrow from the network portion of a Class B subnet mask to get at least 130
Tatiana [17]

Answer: Eight

Explanation:

A class B address is 255.255.0.0. We need to borrow 8 bits from the network portion to have atleast 130 host per subnet.

11111111.00000000.00000000.00000000

8 0
3 years ago
The ____ command creates a subdirectory under a directory. rd md cd ad
katovenus [111]
Md command, (make directory) creates a directory. It's a subdirectory when you md under a directory.
5 0
3 years ago
What underlying concept is edge computing based on?
guajiro [1.7K]

Answer:

Edge computing was developed due to the exponential growth of IoT devices, which connect to the internet for either receiving information from the cloud or delivering data back to the cloud. And many IoT devices generate enormous amounts of data during the course of their operations.

Explanation:

8 0
2 years ago
Read 2 more answers
Other questions:
  • What is really meant by SSDs
    9·1 answer
  • What Will Social Media Look Like in the Future?
    6·1 answer
  • You may nest while and do-while loops, but you may not nest for loops<br><br><br><br> True False
    10·1 answer
  • (Please answer! Correct answer gets brainliest!)
    5·2 answers
  • 50 POINTS &amp; A FOLLOW!
    11·2 answers
  • Which of the following lines of code is syntactically correct?
    14·1 answer
  • What do libraries allow you to do in C++, and how do you incorporate libraries into a C++ program?
    10·1 answer
  • What is the purpose of application software
    12·1 answer
  • Complete the problem about Olivia, the social worker, in this problem set. Then determine the telecommunications tool that would
    11·1 answer
  • How do news organizations primarily create revenue?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!