1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vinil7 [7]
3 years ago
15

Means storing,accessing information over the internet other than hard drive and your system

Computers and Technology
1 answer:
Angelina_Jolie [31]3 years ago
4 0

Answer:

this describes cloud computing or just an overall cloud drive

Explanation:

You might be interested in
Search engines enable you to
docker41 [41]
The answer is easily <span>locate Web pages related to a specific subject.</span>
6 0
3 years ago
Read 2 more answers
Ron is creating building blocks in Word. How can he make the building blocks that he created available?
daser333 [38]

A) Store those building in Normal template

7 0
3 years ago
Read 2 more answers
When passing a list of parameters to a stored procedure by name, you can omit optional parameters by:
amm1812

When passing a list of parameters to a stored procedure by name, you can omit optional parameters by omitting the parameter name and value from the list.

<h3>What is optional parameter?</h3>

It should be noted that optional parameter simply means a method that doesn't force pass arguments at calling time.

In this case, when passing a list of parameters to a stored procedure by name, you can omit optional parameters by omitting the parameter name and value from the list.

Learn more about parameter on:

brainly.com/question/13151723

#SPJ12

5 0
2 years ago
Write a sed command that will display all lines of the birthday file that do not contain the string March. What was the sed comm
Dmitriy789 [7]

Answer:

sed '/march/{d;}' birthdays.txt > result .txt

Explanation:

sed syntax is basically:

<em>sed '/expression/{command;command;...;}' inputfile > outputfile</em>

  • First, for the expression part, we use /march/ to match all lines containing that string.
  • Then for the command part, we only use {d} command to delete every matching line found.
  • The third part contains the input file to process, I have named it birthdays.txt, but it could have been any other file needed.
  • Finally "> result .txt" makes the script output to be saved into a file named result.txt
6 0
3 years ago
Christina has been asked by the firewall administration group to identify secure network protocols that can be used to prevent n
kotegsom [21]

Answer:

SSH, HTTPS and SMTP

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Hence, SSH, HTTPS and SMTP are considered as secure network protocols.

HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL).

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

6 0
3 years ago
Other questions:
  • Which finger types the return or enter key?
    6·2 answers
  • c++ You are given an array A representing heights of students. All the students are asked to stand in rows. The students arrive
    5·1 answer
  • Given that arrayIntValues [MAX_ROWS][MAX_COLUMNS] is a 2 dimensional array of positive integers, write a C++ function howManyEve
    11·1 answer
  • Which of the following is a benefit, as well as a risk, associated with peer-to-peer networks?
    6·2 answers
  • There are many modes of remote visual communication. which is the most common mode
    5·1 answer
  • What settings are available in the Properties dialog box of a message? Check all that apply.
    6·2 answers
  • Es costoso construir un robot
    6·1 answer
  • The objective of this task is to use Scapy to estimate the distance, in terms of number of routers, between your VM and a select
    7·2 answers
  • In two to three sentences, define "home row" and explain why it is important.
    6·2 answers
  • What is software? Why is it needed?​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!