1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SashulF [63]
3 years ago
13

PLS HELP I WILL GIVE BRAINLY how does gg docs show the benefits of Cloud computing?

Computers and Technology
1 answer:
bija089 [108]3 years ago
6 0

Answer:

Explanation:

Go0gle Docs is a web-based office suite composed of three key components: the G0ogle Docs word processing program, Go0gle Spreadsheets spreadsheet program, and G0ogle Presentations presentation program. But Go0gle Docs isn't the only cloud computing application available today. Go0gle Docs is a type of cloud computing.

The simplest form of cloud computing is Software as a Service (SaAS). One such good example of SaAs is go0gle docs. Go0gle Docs, Sheets, and Slides are included with Go0gle Drive Enterprise, allowing for collaborative editing of documents, spreadsheets, presentations, drawings, forms, and other file formats. Users may also view and collaborate on Microsoft Office files as well as 60+ other file types with Drive Enterprise.

(Hope this helps can I pls have brainlist (crown) ☺️

You might be interested in
How can social media be useful for brand awareness ?
shutvik [7]
It lets them reach out to people on that platform that can advertise their products
4 0
3 years ago
For the following graph, what is the goal state? A. state = GOAL B. state = E C. state= D D. cost >= 6
ser-zykov [4K]

Answer:

i think it A but idk but in my opinion i think it is A hope you get it correct

Explanation:

8 0
3 years ago
Determine the hexadecimal value of a mask that can be used to complement the values of thefirst and third bits of f1ag and leave
Makovka662 [10]

Answer:

Let our mask be 1010000...000. Notice that, if we apply XOR operation to any number with this mask, the first and third bits will be complemented and all other bits will be unchanged. Since for each individual bit, XOR with 0 does not change the value of bit and XOR with 1 changes the value of bit.

Explanation:

To give a hexadecimal number, we should know the number of bits in representation of number.

8 0
4 years ago
Please list 15 safety rules that you think should be practiced in the Computer Technology classroom/lab.
nikklg [1K]

Answer:BE RESPECTFUL! Always treat the computer lab equipment AND your teacher and classmates the way that you would want your belongings and yourself to be treated.

No food or drinks near the computers. NO EXCEPTIONS.

Enter the computer lab quietly and work quietly. There are other groups and individuals who may be using the computer lab. Please be respectful.

Surf safely! Only visit assigned websites. Some web links can contain viruses or malware. Others may contain inapropriate content. If you are not certain that a website is SAFE, please ask a teacher or other adult.

Clean up your work area before you leave. All cords should be placed on the tables (not hanging off the sides). Headphones should be placed on the CPU/tower or monitor. Chair should be pushed under the tables. All trash, papers, and pencils should be picked up.

Do not change computer settings or backgrounds.

Ask permission before you print.

SAVE all unfinished work to a cloud drive or jump drive. Any work that is saved to the computer will be deleted when the computer is powered off or updated at the end of the day.

If you are the last class of the day, please POWER DOWN all computers and monitors.

Keep your files organized

Don’t let a student’s desktop become the digital version of his hectic book bag. Set aside a few minutes at the beginning or end of working on an assignment to ensure that students are saving unfinished work somewhere that they will be able to find it next time.

Log off

Logging off is like the digital version of cleaning up after yourself in the classroom. Students need to leave the computer ready for the next user. Logging off is also important to make sure that student work and accounts stay private.

Each person may only use one computer at a time

Computers and peripherals are not to be moved or reconfigured without approval of Lab and Classrooms staff.

Behavior and activities that disturb other users or disrupt the operations of the lab are not allowed. This includes, but is not limited to: physical activities such as "rough-housing," loud music, etc.

Children are only allowed in computer labs if they are well-behaved and supervised at all times. Children may not use the computers or occupy workstation areas. At no time are children to be left unattended.

.Explanation:

sorry about only 9 rules

4 0
3 years ago
4.7 code practice question 2 edhesive i cant figure out the code for this problem csn anyone help me?
rodikova [14]

Answer:

See Explanation

Explanation:

<em>See attachment for complete question</em>

The programming language is not stated; I'll answer using Python and Java

Python:

low = 56

high = 70

for i in range(low,high+1):

    print(i)

Java:

public class PrintOut{

public static void main(String [] args)

{

int low = 56; int high = 70;

for(int i = low; i<=high;i++)

System.out.print(i+" ");

}

}

For both codes, the explanation is:

The code starts by initializing the range of the print out to 56 and 70

Next, the code segment used an iteration that loops through 56 and 70 and print each digit in this range (both numbers, inclusive).

8 0
3 years ago
Other questions:
  • Given positive integer numInsects, write a while loop that prints that number doubled without reaching 200. Follow each number w
    8·1 answer
  • ​​most code division multiple access (cdma) networks conform to ____________ , created by the telecommunications industry associ
    10·1 answer
  • Does the brain play a role in smartphone addiction
    7·2 answers
  • If you need to provide a storage server with fault tolerance through the use of multiple paths between the server and the actual
    14·1 answer
  • Before you enter an intersection on a green light make sure
    14·2 answers
  • List six common raster image file types.
    9·1 answer
  • It is desired to create a mortgage estimator by writing a program containing a function. The user inputs the amount of loan (L),
    6·1 answer
  • Which factors have led to the fast growth in IT​
    13·1 answer
  • The conversion rate is the percentage of what? A. Customers who received cold calls B. Sales leads who reached the interest stag
    13·1 answer
  • Help me out-
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!