1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kitty [74]
2 years ago
10

One concern some users have about storing data or accessing applications in the cloud is .

Computers and Technology
1 answer:
andriy [413]2 years ago
3 0

Answer:

Explanation:

Security is the primary concern about cloud computing. This is the main for many IT departments to refrain from using cloud computing. Some things that put the security of cloud computing to be concerned are: Theft or loss of intellectual property.

You might be interested in
Why is a DNS cache poisoning attack dangerous? Check all that apply. A. Errrr...it's not actually dangerous. B. It allows an att
larisa [96]

Answer:

(B) It allows an attacker to redirect targets to malicious webserver.

(D) It affects any clients querying the poisoned DNS server.

Explanation:

DNS cache poisoning is a serious type of attack that is designed to exploit the vulnerabilities inherent in a Domain Name Server (DNS) where a user is redirected from a real server to a fake one. It is also called DNS spoofing.

Normally, when your browser tries to visits a website through a given domain name, it goes through the DNS server. A DNS server maintains a list of domain names and their equivalent Internet Protocol addresses. This server (DNS) then responds to the request with one or more IP addresses for the browser to reach the website through the domain name.

The computer browser then get to the intended website through the IP address.

Now, if the DNS cache is poisoned, then it has a wrong entry for IP addresses. This might be via hacking or a physical access to the DNS server to modify the stored information on it. Therefore, rather than responding with the real IP address, the DNS replies with a wrong IP address which then redirects the user to an unreal website.

Although they might not be able to control your computer remotely as long as you are not trying to visit a web page via the poisoned information, there are other dangers attached to this type of attack.

Once the DNS server has been poisoned, any client trying to query the server will also be affected since there is no direct way of knowing if the information received from the server is actually correct.

4 0
3 years ago
Steps to log out of an email account ​
Alexxx [7]

Explanation:

Hey there!

While logging out an email remember follwing steps;

  • Go to email and choose account to be removed.
  • Click on manage accounts.
  • Your email will be there, click on it.
  • Then click remove account.

[ You can also go to setting and click on account and then choose google account and click on it and remove it.]

This probably means removing account only but not logging out but works lije that only and when you need it you can again open it, like logging out and logging in.

<em><u>Hope</u></em><em><u> </u></em><em><u>it helps</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em>

4 0
3 years ago
Read 2 more answers
A form of Internet identity theft involving phony e-mail messages asking customers to update their credit card numbers, account
irina [24]

Answer: Phishing

Explanation:

Phishing is a form of identity theft involving phony email messages asking customers to update credit, debit, cards, accounts passwords, and all whole of personal information. It is still one of the relevant form of identity theft whereby personal information is taken away in form of electronic communication or messages.

One example could be when a person receives a mail from xyz.com and ask him/her to click on a page. upon clicking on it the person will be redirected to another page. in that page several details would be there such as username and password, bank account details. So once all these details are entered in the web page all our personnel information will leaked into the servers of the hackers and could lead to serious troubles. Sometimes phishing is also in form of fake social networking website which resembles exactly to that of the original one.

So Phishing is a for of identity theft.

3 0
3 years ago
Jody should select the
Alex Ar [27]

Answer:

In the View tab, you will find Zoom Option. Set the Zoom level to 100%.

Explanation:

You need to set the Zoom level to 100%, And you can do this, by setting the zoom level to 100%, from the scroll bar. Or you can move to view tab in the main menu, and then in the Ribbon, you need to select the zoom % and set it to 100 percent. You will then be able to see the entire page. And if you want, you can increase the Zoom level to even further, for getting an even more clearer picture.

3 0
3 years ago
Tfuuvj vjiibjoon Ghosh kpj
Nookie1986 [14]

Answer: A

Explanation: For any formal document you need your major points.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Write a Java application that inputs a series of 10 integers and determines and prints the largest and smallest integer. Use a c
    12·1 answer
  • If you want to learn more about a command, point to its button and wait for the ____ to appear.
    13·1 answer
  • Driver’s License Exam The local driver’s license office has asked you to create an application that grades the written portion o
    9·1 answer
  • Consider the following code segment. int[] seq = {3, 1, 8, 4, 2, 5}; for (int k = 1; k &lt; seq.length; k++) { if (seq[k] &gt;=
    5·1 answer
  • DJ Davon is making a playlist for an internet radio show; he is trying to decide what 1212 songs to play and in what order they
    12·1 answer
  • Pls answer i need to turn it in today!!
    15·1 answer
  • Pls help computer science I will give brainliest
    8·2 answers
  • WILL MARK BRAINLIEST FOR ANYONES ANSWER!
    12·1 answer
  • Icon view, list view, and details view are all common views provided by which kind of program?
    12·2 answers
  • Add me on f0rtnite <br> (Tsarbacon)
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!