1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kitty [74]
3 years ago
10

One concern some users have about storing data or accessing applications in the cloud is .

Computers and Technology
1 answer:
andriy [413]3 years ago
3 0

Answer:

Explanation:

Security is the primary concern about cloud computing. This is the main for many IT departments to refrain from using cloud computing. Some things that put the security of cloud computing to be concerned are: Theft or loss of intellectual property.

You might be interested in
If background option when creating file. the color of the background is
DaniilM [7]

Answer:

Light Grey.

Explanation:

I guess because mostly I have seen document background colour is Grey.

7 0
3 years ago
Read 2 more answers
Advantages of special purpose computer
anzhelika [568]

Answer:

The main advantage of the special-purpose systems is the possibility to utilize a much higher fraction of available silicon to actually do calculations. ... All the rest of the calculation, such as the time integration of the orbits of particles, I/O, and diagnostics are handled by a general-purpose host computer..

Explanation:

5 0
3 years ago
Which of the following reflects the order of operations
lorasvet [3.4K]

Answer: PEMDAS

Parenthesis, Exponents, Multiplication, Division, Addition, Subtraction

Explanation:

3 0
3 years ago
Read 2 more answers
What are three ways of verifying legitimate right of access to a computer system?
dezoksy [38]

Something you know (such as a password)

Something you have (such as a smart card)

Something you are (such as a fingerprint or other biometric method)

<h3>What are the 3 methods of authentication?</h3>
  • The three authentication factors are Knowledge Factor – something you know, e.g. password.
  • Possession Factor – something you have, e.g.mobile phone. Inherence Factor – something you are, e.g., fingerprint.

To learn more about it, refer

to brainly.com/question/22654163

#SPJ4

7 0
2 years ago
In what cattell called the ____ form of factor-analysis, large amounts of data are collected on one subject over a long period.
True [87]
The P technique. 


Good luck! (:
3 0
4 years ago
Other questions:
  • Gina is upgrading your computer with a new processor. She installs the processor into your motherboard and adds the cooling syst
    5·2 answers
  • I need help to find out what is wrong with this program and my variable, "exponent" comes out as 0 in the output instead of the
    14·1 answer
  • Can you use a backup camera when you take your drivers test
    9·1 answer
  • in some caes before carrying out a command a program may ask you to provide may ask you to provide more information or to make a
    6·1 answer
  • Heelo how do u do python syntax lesson 11 on code academy
    12·1 answer
  • Nielsen purchases scanner data from retail transactions to track the sales of consumer packaged goods, gathered at the point of
    14·1 answer
  • If nobody buys a ticket to a movie, do they still show it?
    5·1 answer
  • Which setting is used to determine the order of printing pages?
    15·1 answer
  • PLZZZZ HELP!!!
    12·2 answers
  • alle Mbawah: Attempt 1 How does a bystander become an advocate? By harassing the bully until he or she stops the harmful activit
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!