1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serggg [28]
3 years ago
12

Select three advantages of cloud computing.

Computers and Technology
1 answer:
777dan777 [17]3 years ago
5 0

Answer:

easily managed, large amount of storage capacity, great flexibility

Explanation:

You might be interested in
Why is it important to follow a consistent naming convention for variables?
Vitek1552 [10]

Answer:

today I am going to be out for the job interview so if I will make it happen I am going to New Orleans this week to get the kids to work on the spot and I can get ready to go out to dinner and I can make a few more people

4 0
2 years ago
What is e-governence?What are the advantage of it.​
kondaur [170]

Answer:

The advantages of e-government include an improved flow of information from citizen to government, government to citizen, and within government itself. Additionally, e-government helps modernize administration procedures, improving economies and promoting transparency in the process.

E-government is the use of technological communications devices, such as computers and the Internet, to provide public services to citizens and other persons in a country or region.

5 0
3 years ago
Which terms describes Benito Mussolini’s form of government
slega [8]
The political system that describes Benito Mussolini’s form of government would be totalitarian.Hope this answers the question:)
5 0
4 years ago
Read 2 more answers
What is a method? an object instantiated from a class a coordinated sequence of instructions that will be carried out when reque
yKpoI14uk [10]

Complete Question:

What is a method?

A. An object instantiated from a class

B. An elegant and efficient way of programming

C. A coordinated sequence of instructions that will be carried out when requested

D. Using Alice control structures such as a a "Loop" to shorten code

Answer:

C. A coordinated sequence of instructions that will be carried out when requested

Explanation:

A method also known as function or procedure in other languages is a written set of code with a name and parameter list that can be requested/ called/invoked by typing out its name to carryout its function. A method can be seen as a  subprogram which carries out some action on data and most times gives back (returns) a value.

7 0
3 years ago
Write a function called st_dev. St_dev should have one #parameter, a filename. The file will contain one integer on #each line.
kodGreya [7K]

Answer:

  1. import statistics
  2. def st_dev(file_name):
  3.    with open(file_name) as file:
  4.        data = file.readlines()
  5.        numList = []
  6.        for x in data:
  7.            numList.append(int(x))
  8.        
  9.        return statistics.pstdev(numList)
  10. print(st_dev("text1.txt"))

Explanation:

The solution code is written using Python.

To ease the calculation task, we can import Python statistics module to use the pstdev method to calculate the population standard deviation of a list of numbers (Line 1).

Next, create a st_dev function that take single argument file_name (Line 3). In the function, it will open the input file and read the data line by line (Line 4-5). Create a for loop to traverse through each line of the data which is an integer and append it to numList (Line 7-8). We can pass the numList to pstdev method (Line 10) and return the resulting standard deviation value as output.

We test the function by passing a file which hold a list of integer values in each line (Line 12).

8

9

12

11

21

15

16

10

7

13

And the output we shall get is 4.019950248448356

6 0
4 years ago
Other questions:
  • When you were configuring Encrypting File System (EFS) in the lab, a __________ on the Documents folder in the File Explorer ind
    5·1 answer
  • How do the following improve security <br> User Id <br> Password<br> Encryption
    10·2 answers
  • Effective feedback should focus on the behavior, not the person.<br><br> True<br> False
    9·2 answers
  • Create an interactive program to use class a LightsOut class to allow a user to play a game. Each step in the game will require
    6·1 answer
  • An example of a current disruptive technology is a?
    8·2 answers
  • A command, such as a button or keyboard shortcut, that performs a specific task is known as a
    9·2 answers
  • Instructions
    8·1 answer
  • Ethernet and wireless networks have some similarities and some differences. One property of Ethernet is that only one frame at a
    15·1 answer
  • You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a d
    10·1 answer
  • your manager asked you to set up a secure network connection at a remote site to move over some back ups. what protocol what do
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!