1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Blizzard [7]
2 years ago
15

Which word or phrase refers to an increasingly common method of computing and storing files?

Computers and Technology
2 answers:
Vlad [161]2 years ago
8 0

Answer:

cloud computing

Explanation:

Alecsey [184]2 years ago
3 0
The answer is Cloud computing
Hope this helps-
You might be interested in
Write a paragraph expressing how you'd use the computer to enhance your place of work.​
Charra [1.4K]

Answer:

Have water by, have it organized, and have notes by you welcome.

Explanation:

4 0
3 years ago
Write a function named dice_eval that accepts two parameters representing numeric dice values and returns a string describing th
Zigmanuir [339]

Following are the "dice_eval" method code into python language.

Program Explanation:

  • Defining a method "dice_eval" that takes two variables "d1,d2" in its parametes.
  • Inside the method, multiple conditional statements were used that adds the parameter values and calculates its value which can be defined as follows:
  • In the if block, it adds the parameters and uses or gate that check its value that is equal to 7 or 11. so, it will return a string message that is 'Winner!'.  
  • In the elif block, it adds the parameters and uses or gate that check its value that is equal to 2 or 3 or 12. so, it will return a string message that is ' C r aps ! '.
  • In the else block, it uses a return keyword that adds parameter value and prints a string value.
  • Outside the method "d1,d2" is declared that inputs the value from the user-end, and passes the value into the method, and prints its value.

Program:

def dice_eval(d1, d2):#defining a method dice_eval that takes two parameters

if (d1+d2)==7 or (d1+d2)==11:#defining if block that adds parameter value and use or operator to check its value

return 'Winner!'#return string value

elif (d1+d2)==2 or (d1+d2)==3 or (d1+d2)==12:#defining elif block that adds parameter value and use or operator to check its value

return 'C r aps!'#return string value

else:#defining else block

return 'Point is '+str(d1+d2)#return string value with adding parameter

d1=int(input())#defining d1 that input value

d2=int(input())#defining d2 that input value

print(dice_eval(d1,d2))#calling method and print its return value

Output:

Please find the attached file

Please find the complete code in the attached file.

Learn more:

brainly.com/question/15011927

4 0
2 years ago
Remote authentication has always been a concern because the person is coming from a public network, and many companies require t
g100num [7]

Answer:

Incomplete Question.

I'll answer this question based on general terms

Explanation:

Two Factor Authentication, abbreviated as 2FA.

It is a type of authentication that requires the presentation of two credentials for access to personal data and information.

The credentials needed for a 2FA are

1. Either of the following; PIN, Password or Pattern

2. Your device or gadget which could be an ATM Card, Mobile Phone

3. Biometrics such as fingerprint, voice input

Number one is often referred to as "Something you know"

Number two is referred to as "Something you have"

Number three is referred to as "Something you are"

The 2FA doesn't require the three aforementioned credentials. It only needs just two of the credentials to provide its authentication.

8 0
3 years ago
Read 2 more answers
Kenny works with an IT company. His company is about to launch new software in the market. He has to ensure that this new softwa
butalik [34]

The job profile that Kenny is likely to have is  software analyst.

<h3>What is a job profile?</h3>

This is known to be that which states the details of an employee in regards to their  job.

Note that a software analyst is known to be that person who examines and maintain the software development process, carry out configuration management, and others.

So, The job profile that Kenny is likely to have is  software analyst.

Learn more about job profile from

brainly.com/question/3700565

#SPJ1

7 0
2 years ago
Your Web page provides a form for users to add their names to a membership list, stored in a text file. You are writing a progra
vlada-n [284]

Answer:

For the above condition, and as mentioned none of the mode will work, and we need to make use of the JSON format. And we nee to use the JavaScript, and we don't need to mention the mode in JavaScript. Thus, this is nowadays used solution for this old problem that existed when we used to code using c++ and c.

Explanation:

You need to write over this text file, and you also need to read. Hence, you need to open the file with the three privileges, and the append will be required,and this way we can only move line by line. However, this is an old style. Now we save in text file in JSON format. The data collected  from Form is converted to JSON format and written in text file. And as required data can be read or written, and as required.  So if we use only JSON format, then we need not mention the mode, as its not required these days in new languages like JavaScript.

3 0
2 years ago
Other questions:
  • ​your business has a web server that has suddenly become unresponsive. when you study the server's logs there are a huge number
    9·2 answers
  • An indirect effect of an action, be it a cost or benefit, for a third party who did not agree to the action is known as a(n) ___
    8·1 answer
  • HELP asap please... ​
    13·1 answer
  • After reading the article, "The Impact of Technology", answer the following question.
    7·1 answer
  • Are video games a viable source of income if you’re good at them
    10·1 answer
  • Translation of a file into a coded Format that occupies less space than the original file is called
    6·1 answer
  • Which branch of science helps avoid or minimize stress-related injuries at workplace?
    14·2 answers
  • What TCP message will be generated for an incoming SYN request for which is there no matching LISTENING port
    15·1 answer
  • Describe all the steps a router goes through while deciding where to send the a packet. Explain why a router would choose one ro
    7·1 answer
  • Does The ps5 digital have a disc drive even Though ps4 games are not compatible
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!