1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natalija [7]
3 years ago
5

8. Cloud Storage is

Computers and Technology
2 answers:
torisob [31]3 years ago
8 0

Answer:

The correct option;

Computer technology to store files on the internet

Explanation:

Cloud Storage provides a means where data files originally locally stored on a computer are stored in remote or off-site locations which are then accessible through a public internet source or through a private network

The provider of the cloud services takes responsibility for data which are stored in the site

A cloud storage consists of a data server that is connected to the internet to which files are transferred to by a user manually or by automation. The data server then sends the data further to other server. The user can then access the stored data through the cloud storage provider's users web interface.

masha68 [24]3 years ago
5 0

Answer:

D

Explanation:

d) Computer technology to store files on the Internet,

You might be interested in
6 external parts of computer
vivado [14]
<span>External computer parts are those that connect to the case, often to provide ways to input or output data.

Here are a 6 examples of external parts:
</span>Monitor
Keyboard
Mouse
Speakers
Printer
External Hard Drives

I hope this has helped you.
6 0
3 years ago
Read 2 more answers
Which two wildcard masks are required in an extended access list entry that blocks the traffic from network 192.168.20.0/26 to n
Jobisdone [24]

Answer:

The two wildcard masks that are required in an extended access list entry that blocks the traffic from network 192.168.20.0/26 to network 172.16.32.0/28 is 0.0.0.63 and 0.0.0.15

Explanation:

To identify the wild cards simply look slash number. Regardless of the netmask number, the corresponding wildcard mask for the slash /26 and /28 are 0.0.0.63 and 0.0.0.15.

8 0
4 years ago
What is a command-line program?
tester [92]
A, I think.....


Explanation:
6 0
4 years ago
Read 2 more answers
When researching Information about technology for use in a project, it is NOT important to consider the date that the informatio
REY [17]

Answer:

B. False

Explanation:

Hope this helps!

4 0
2 years ago
When using correct ergonomic technique be sure to _____.
adell [148]
It is A my boy ✊✊✊✊✋✋☝
6 0
3 years ago
Read 2 more answers
Other questions:
  • Blender questions
    8·2 answers
  • Which command compiles the java source code file welcome.java?
    9·1 answer
  • Explaing why the findings are different between a general purpose search engine ( google) and a meta search engine ( ask jeeves)
    9·1 answer
  • Write another function to convert a value to its word equivalent leveraging the following tuple - o Number = (‘One’, ‘Two’, … ‘N
    10·1 answer
  • A client is asking for a printing solution that will print three sheets of paper with identical information on each page with a
    13·1 answer
  • To insert a footnote in a document, a user would navigate to the _____ tab.
    5·2 answers
  • ......... mi2hej<br><br>ejid8eo19o1b2bxhxjxjdnneejk2929nr
    5·2 answers
  • Which of these is not enumerated as a motivation to create accessible web content?
    10·1 answer
  • What are the examples of computer software​
    8·2 answers
  • A regional bank implemented an automated solution to streamline their operations for receiving and processing checks/cheques. th
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!