1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Novosadov [1.4K]
3 years ago
9

---------------------- use of the Internet to access programs and data on computers that are not owned and managed by the user o

ften using large data centers
Computers and Technology
1 answer:
VLD [36.1K]3 years ago
5 0

Answer:

Cloud computing

Explanation:

Cloud computing is an information technology term that describes the process of using and applying online or internet services to access, and store data, including networking databases, and other data on computers.

It generally involves saving and accessing personal data and files created online (usually large data centers) without necessarily saving it on the PC hard drive.

Hence, in this case, thé correct answer is "Cloud Computing."

You might be interested in
.) Write a complete C program in one file which takes a double value from the user, cubes it, and prints the result. Your progra
Ket [755]

Answer:

Explanation:

#include <iostream>

using namespace std;

double cube(double);

int main()

{

   double ci=0;

   cout << "Enter avalue :";

   cin >> ci;

   cout << "Cube of " << ci << "is =" << cube(ci) << endl;

   return 0;

}

double cube(double i)

{

   return(i*i*i);

}

8 0
3 years ago
A computer equipped with fingerprint recognition software, which denies access to a computer to anyone whose fingerprint is not
morpeh [17]

Answer: C. It is not possible for any top computer hacker to gain access to a computer equipped with the recognition software solely by virtue of skill in replicating the structure of fingerprints

Explanation:

Option A is incorrect. There's no information on the speed and analysis of the fingerprint.

Option B is incorrect. No information regarding computer installation was given in the passage.

Option C is correct. With the information, it can be concluded that it is impossible for a top hacker to have access to the protected computer.

Option D is Incorrect. Information regarding time and investment costs that were incurred during the software development wasn't given in the passage

Option E is Incorrect. The passage didn't give information on the errors that the software produced.

8 0
3 years ago
What is the primary difference between 3g and 4g cellular systems? 4g systems have greater transmission speeds. 3g systems are u
noname [10]
I believe the correct answer is the first option. The primary difference between 3g and 4g cellular systems would be that 4g systems have faster transmission as compared to 3g. The G would mean generation. The very difference of both is their speeds.
4 0
3 years ago
An automatic door at a store has a sensor in front (A0) and behind (A1). The
yanalaym [24]

Answer:

whats the question?

Explanation:

4 0
3 years ago
Design a chip that can complete four bit binary addition, subtraction, and, or operation. Complete the Verilog program and show
marissa [1.9K]

Answer:

How am I supposed to design a chip here?

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • The CPU is referred to as the ______ of the computer.
    14·2 answers
  • How to get 60 fps pubg​
    9·2 answers
  • What are 2 ways that technology can negatively impact the environment.
    8·2 answers
  • This library function returns a random floating point number within a specified range of values. The function returns a random f
    12·1 answer
  • An office employee working in a payroll department uses a customized program to log hours employees have worked. The customized
    12·2 answers
  • What is the square root of 1600 and 36 ?​
    6·1 answer
  • How does a author develop a character in a story?
    14·2 answers
  • How many pounds must a sand bag weigh to test if a safety net can absorb the proper amount of force? A. 150 lbs. B. 200 lbs. C.
    6·1 answer
  • When a person bullies someone using technology, it's called:
    9·2 answers
  • Everyone within a company needs to be aware of what data can do to improve business processes and how to make it happen. Which c
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!