1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xz_007 [3.2K]
3 years ago
11

The best answer it requests services, data and other resources available on the server​

Computers and Technology
2 answers:
Brilliant_brown [7]3 years ago
6 0

Answer:

Explanation:

?

Viefleur [7K]3 years ago
3 0

Answer:

go and f              u                           c.         k yourself. The answer is   A

Explanation:

<em>N                      i                    g            b         a</em>

You might be interested in
In which type of situation would it make sense to use edge computing?
ZanzabumX [31]

A type of situation in which it would make sense to use edge computing is: b. where critical decisions must be made on a split-second basis.

<h3>What is edge computing?</h3>

Edge computing can be defined as a distributed computing system that involves the deployment of computing and storage resources closer to the sources of data, so as to save time and enhance the decision-making process.

This ultimately implies that, a type of situation in which it would make sense to use edge computing is a scenario where critical decisions must be made on a split-second basis.

Read more on edge computing here: brainly.com/question/23858023

#SPJ1

<u>Complete Question:</u>

In which type of situation would it make sense to use edge computing?

a. where data is uploaded to a server at a scheduled time each week

b. where critical decisions must be made on a split-second basis

c. where users are in close proximity to the central data server

d. where there are few or no digital devices to capture

e. i don't know this yet

4 0
2 years ago
Sarah stores data electronically.
attashe74 [19]

Answer:

Always back up your data. Prevention is the best protection.

Diversify your backups. You always want more than one backup system.

Encrypt sensitive data. Data is not always encrypted even when it's on a backup tape.

Address data security.  

Use anti-virus and email security.  

Trust the professionals

Explanation: <u>HOPE IT HELPS YOU</u>

3 0
3 years ago
A(n) systems analyst codes system software, fine-tunes operating system performance, and performs other system software-related
NikAS [45]
In general, a systems analyst is a person who uses analysis and design strategies to solve business problems.
They also analyze an organization’s current computer systems and develop information systems solutions to help the organization run more smoothly.

Now knowing a systems analyst job, therefore the answer to this is “FALSE”.

<span> </span>

6 0
4 years ago
The grade of a metric bolt is designated by
Andre45 [30]
The answer to your question is The grade of a metric bolt is designated by the number stamped on the head of the bolt.
5 0
3 years ago
Which best describes the education and training cluster?
kicyunya [14]
3 workers because that explains the question the best
6 0
4 years ago
Read 2 more answers
Other questions:
  • To extend the bottom border of a hyperlink across the complete width of a navigation list, change the ____ property of each hype
    9·1 answer
  • find all breweries that specialize in a particular beer style. A brewer is considered specialized if they produce at least 10 be
    5·1 answer
  • The chain of command is an unbroken line of authority that extends from the top of the organization to the lowest echelon and cl
    7·1 answer
  • When does playstation charge formy new subscription
    5·1 answer
  • An online service allows users to integrate their phonebook with their social media profiles and stores it on the cloud. The pho
    12·1 answer
  • HELP AASAP BRAINLIEST JUST HELP
    13·1 answer
  • Outline 3 computer system problem that could harm people and propose the way avoid the problem​
    12·1 answer
  • We investigated a program which is probably used as one component of a bigger password breaking algorithm. We determined that th
    14·1 answer
  • 3. Comparing the Utopian and dystopian views of Technology according to Street (1992) which one in your view is more applicable
    9·1 answer
  • I'm working on an assignment for my computer science class (Edhesive) and when I run the code, there are no errors. But when I t
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!