1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stells [14]
3 years ago
11

(d) What other services beside cloud-based software may be provided by Internet hosts?[1]

Computers and Technology
1 answer:
VashaNatasha [74]3 years ago
7 0

Answer:

Internet

(Some have Cable TV)

You might be interested in
Which function of InfoSec management encompasses security personnel as well as aspects of the SETA program?
inessss [21]

Answer:

People

Explanation:

Information security management provides a description of the controls needed by an organization in order to ensure that it is capable of protecting the integrity, availability, and confidentiality of assets from security vulnerability and threats. On the other hand, the SETA program is three phased and ensures that organizations address and implement training and techniques for information security. Hence the only function that encompasses security personnel as well as aspects of the SETA program is the People function.

8 0
4 years ago
A malware which acts like a spy in computer system is called ___?​
Leona [35]

Answer:

A Trojan horse, or Trojan

6 0
3 years ago
Read 2 more answers
You can tell a cell is the active cell when it has a
skelet666 [1.2K]
C is the answer to your question
C
6 0
2 years ago
Read 2 more answers
¿en minimo cuantos computadores se puede construir una red,y en maximos en cuanto y que se necesita para que este en la red?​
stira [4]

Answer:

me no speak taco bell

Explanation:

3 0
3 years ago
What is the highest strength for the leviathan axe in god of war
kicyunya [14]

Answer:

85

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • A standard science experiment is to drop a ball and see how high it bounces. Once the bounciness of the ball has been determined
    10·1 answer
  • Technician A says copper has a low resistance. Technician B says the length of wire doesn't affect resistance. Who is correct?
    11·1 answer
  • Which is an example of an active visual interface? a display indicating the amount of ammunition for the currently equipped weap
    13·2 answers
  • Amelia has selected the chart in her PowerPoint and needs to change the chart type. Which one of the Chart Tools tabs would she
    15·1 answer
  • We want to make a row of bricks that is goal inches long. We have a number of small bricks (1 inch each) and big bricks (5 inche
    5·1 answer
  • Discuss the infrastructure necessary for the Internet of Things and Cloud computing to exist. What unique services does this ena
    7·1 answer
  • What are digital forensic techniques? A. Identifying, extracting, and evaluating evidence obtained from digital media such as co
    11·1 answer
  • Sixteen stations, numbered 1 through 16, are contending for the use of a shared channel by using the adaptive tree walk protocol
    7·1 answer
  • Anyone know the friends song by Marshmello? It's stuck in my head.
    12·2 answers
  • Match each type of video camera to its features:
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!