1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flura [38]
2 years ago
13

________ is a model of computing in which firms and individuals obtain computing power and software applications over the intern

et, rather than purchasing and installing it on their own computers.
a. client/server computing
b. p2p computing
c. mobile computing
d. cloud computing
Computers and Technology
1 answer:
Irina-Kira [14]2 years ago
4 0
Pretty sure the answer is A.
You might be interested in
Application software (apps) includes all the programs that allow you to perform specific tasks or applications on a computer. In
bulgar [2K]

Answer:

Microsoft Excel / Spreadsheet software.

5 0
3 years ago
Pls help I will give points
Fed [463]

Answer:

phone !!

Explanation:

since it's a mobile app, that would apply to a handheld device !!

i hope this helps !!

3 0
3 years ago
Read 2 more answers
A technician is performing Windows preventative maintenance tasks on all computers in the organization. She wants a way to creat
antiseptic1488 [7]

Answer:

The tool that allows to configure a custom console is "mmc.exe".

Explanation:

MMC is a Microsoft Management Console. It is used to customize the management console and add the tools in console that are required by the technician.

3 0
3 years ago
The information that a program requires in order to accomplish its objective is called the.
ivolga24 [154]

The information that a program requires in order to accomplish its objective is called input.

<h3>What is a program?</h3>

A program is a set of instructions by which the computer performs various tasks. The program is a sequence of instructions that are followed by the computer to run. An example is Microsoft Word.

A computer program comes under software. The sequence code of a program that is readable by humans is called source code. The program is run by information that is called input.

Thus, the data that a program needs in order to achieve its goal is referred to as input.

To learn more about the program, refer to the below link:

brainly.com/question/14368396

#SPJ4

8 0
1 year ago
While investigating an email issue, a support technician discovers no users can access their email accounts on the company’s ema
Paraphin [41]

Answer:

The question is incomplete.The full question with options is rewritten below:

"While investigating an email issue, a support technician discovers no users can access their email accounts on the company’s email server connected to the private LAN. Pinging the email server from several workstations on the LAN results in 0% packet loss.  

Which of the following is the next step the technician should take in troubleshooting this issue?  

A. Contact the ISP, inform the provider of the issue, and ask the provider to check the server.

B. Verify the server has a valid assigned IP address on the LAN subnet.

C. Escalate the problem to a server administrator to check for issues with the server.

D. Check the workstations on the LAN for APIPA configuration."

The answer is option (C): <em>Escalate the problem to a server administrator to check for issues with the server</em>

Explanation:

Being a Support Technician, you may not be able to determine the main issue with the mail server but may need to escalate further to the next category of individual that will confirm the issue with the mail server, in this case the server administrator as he may have higher access into the server at the back end or may directly liaise with the Private ISP.

7 0
3 years ago
Other questions:
  • A hacker changing the ip addresses used in conjunction with a particular company’s web site to re-route them to the hacker’s ser
    11·1 answer
  • Packet switching was invented by: <br> Apple <br> DARPA <br> Google <br> Microsoft
    13·1 answer
  • Determine the number of cache sets (S), tag bits (t), set index bits (s), and block offset bits (b) for a 40964096-byte cache us
    15·1 answer
  • Maria is creating a program where the user will enter their name to begin. What kind of variable should be used for the user’s n
    15·2 answers
  • How do I make someone "Brainiest". <br> First person to reply will get "Brainiest"
    8·2 answers
  • Write code which takes two inputs from the user, a number of sides followed by a side length, then creates a regular polygon wit
    10·2 answers
  • Guys im getting the ps5 tomorrow :)​
    5·2 answers
  • Why is it important to have a price assiociated in every product​
    10·2 answers
  • In this image, which feature did we most likely use to quickly change the background, fonts, and layout?
    6·1 answer
  • How to write the algorithm to calculate the square of five numbers
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!