1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vinil7 [7]
2 years ago
15

Means storing,accessing information over the internet other than hard drive and your system

Computers and Technology
1 answer:
Angelina_Jolie [31]2 years ago
4 0

Answer:

this describes cloud computing or just an overall cloud drive

Explanation:

You might be interested in
How can knowing internal and external parts of computer help me
mafiozo [28]
Going over parts of a computer and how it functions will help you understand all the vital components that make up a computer.
8 0
3 years ago
What are some options available in the Spelling and Grammar Checker in word?
denpristay [2]
Some options are add to dictionary, ignore once, ignore all, autocorrect, change, and change all.
6 0
3 years ago
Given that a function receives three parameters a, b, c, of type double , write some code, to be included as part of the functio
hoa [83]

Answer:

   public static void quad(double a, double b, double c) {

       double D = (Math.pow(b, 2)) - (4 * a * c);

       if (D<0){

           System.out.println("no real solutions");

       }

   }

Explanation:

The code snippet above implements the function in Java programming language

As required by the question, the line  double D = (Math.pow(b, 2)) - (4 * a * c); evaluates b squared" - 4ac and assignes the value to the variable D

An if statement is used to test if D is less than 0, if this is true the message no real solutions is printed

5 0
3 years ago
When you try to boot your computer it hangs after post?
Likurg_2 [28]
What are you trying to ask...
4 0
3 years ago
How can you block attackers, who are performing reconnaissance and probing, with nmap and nessus port scanning and vulnerability
Tresset [83]
<span> You can block attackers, who are performing reconnaissance and probing, with NMAP and Nessus port scanning and vulnerability assessment scanning tools by i</span>dentifying the digital signatures of common reconnaissance and probing tools such PING, scans performed by Nmap, Nessus®, etc. The IDS and IPS devices should be programmed to specifically alert and block reconnaissance and probing IP packets that are commonly used by these attack tools. 
7 0
3 years ago
Other questions:
  • If you wanted to make certain numbers in a spreadsheet stand out, you should _____.
    11·2 answers
  • A computer that delivers requested webpages to your computer or mobile device is a(n) _________.
    9·1 answer
  • To easily add an organizational chart to a document, users should select _____. SmartArt Text Boxes Shapes Clip Art
    8·2 answers
  • What's is the contribution of technology to the country?
    15·1 answer
  • Which of the following is a narrative essay most like?
    10·2 answers
  • A large IPv4 datagram is fragmented into 4 fragments at router 1 to pass over a network with an MTU of 1500 bytes. Assume each f
    15·1 answer
  • Jerry wants to save his company money. He decides to move to open source software for his word processing needs. Jerry then down
    5·1 answer
  • If a computer is not working properly,the best thing to do is ________?
    5·2 answers
  • What is 36 Denary in Binary?? PLEASE ANSWER I WILL GIVE U BRAINLY!!
    9·2 answers
  • I have a problem with my Nintendo DS lite does anyone know how to fix it?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!