1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xeze [42]
3 years ago
8

What makes up the cloud in cloud computing ?

Computers and Technology
1 answer:
gayaneshka [121]3 years ago
8 0

Answer:

storage

Explanation:

hope this helps

You might be interested in
Im trying to do an animation only using simplegui in python and my objective is make the ball enters frame, be confused and jump
viva [34]
The answer is B = 450 because I just know
5 0
2 years ago
write query for all products reutrn product name with its amounts due, paid, canceled, and refunded, order the result by product
spayn [35]

Answer:

SELECT product_name, amount_due, amount_paid,

              cancelled, amount_refunded

   FROM products

ORDER BY product_name ASC;

Explanation:

SQL (Structured Query Language ) was used above.

The SELECT command is used to list all the variables we want in our output.

The FROM command signifies the location.

ORDER BY command ensures that your result is ordered

ASC means Ascending Order.

; signifies the end of the query.

NOTE: Underscores were used because variables cannot be written with spaces between them

8 0
3 years ago
BRAINLIEST Which function will add a name to a list of baseball players in Python?
Tju [1.3M]

Answer: Append()

Explanation:

8 0
3 years ago
Read 2 more answers
Computer crimes are a big concern since the creation of innovative technological advances; which is/are examples of computer cri
Natali [406]

Answer:

The answer is E: All of the above

Explanation:

All of the above scenarios are examples of serious computer crimes. They are crimes that exist in the offline world but take place online. Sexual predators, for instance, mostly take advantage of the anonymity provided by the internet. They often target dating sites and find suitable victims. Cyber bullying and Cyber stalking are just as harmful as any other computer crime. Industrial Espionage may also somehow fall into this category. Less frequently, criminals may steal documents and computer files or more often, illegally gain access to company’s trade secrets on computers and servers.

3 0
3 years ago
Read 2 more answers
How do you make the task bar and e-mail read in larger print
JulijaS [17]
You have to go into settings and search larger text
5 0
3 years ago
Other questions:
  • Of the different IRT roles, the _______________ is head of the team and issues the ultimate call regarding how to respond to an
    15·1 answer
  • What do character formats do for your document's message? A. Set how text aligns within a document B. Provide organization C. Pr
    6·2 answers
  • The ash and dust from a volcanic eruption can cause a ______ change in the environment.
    8·1 answer
  • Which of the following is true about radio waves? They have short wavelengths. They have high energies. They reveal hot gases. T
    10·2 answers
  • What does an "embedded video" mean
    7·1 answer
  • Some one help pls will mark brainless !!!!!
    13·1 answer
  • Write 2 paragraphs. 1 comparing Shrek the movie and Shrek the musical and another contrasting them.
    12·2 answers
  • The _____ of a story describes the time and location of a story.
    5·2 answers
  • You use a Windows desktop system to edit and produce audio files. Your system has two hard disks installed. Your applications ar
    10·1 answer
  • I have all of the points and brainliest, but it won't level up, I don't know why, anyone know why?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!