1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gladu [14]
2 years ago
15

What is Cloud computing? Explain briefly

Computers and Technology
2 answers:
Korvikt [17]2 years ago
7 0

Answer:

Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. Large clouds often have functions distributed over multiple locations, each location being a data center.

Explanation:

I hope that helps!!

djverab [1.8K]2 years ago
7 0

In this exercise we have to explain how the Cloud of a computer works, so we can define it as data storage and computing power, without direct active user management.

<h3>What is the cloud concept?</h3>

Cloud computing is a colloquial term for the on-demand availability of computer system resources, especially data storage and computing power, without direct active user management. Basically, cloud storage is the act of storing one or more files on a hard drive outside your machine, over the internet. A curious point to consider is that, often, these stored files may not even be physically in the same country as you reside.

See more about cloud at brainly.com/question/1176518

You might be interested in
_______________ is used by a hacker to mask intrusion and obtain administrator permissions to a computer.
Sergeu [11.5K]

Answer:

Rootkit.

Explanation:

Rootkit is a collection of software tools,mostly malicious.These are mostly used by hackers to obtain administrator permission to a computer by masking intrusion.

Root-kit is made from two word Root and kit.Where root refers to the name of privileged account on an operating system that is somewhat like unix and KIT refers to the tools used.

6 0
3 years ago
Some email programs let you use a ____ to move incoming mail to a specific folder or to delete it automatically based on the con
KatRina [158]

Answer:

filter

Explanation:

Some email programs let you use a filter to move incoming mail to a specific folder or to delete it automatically based on the content of the message.​

The filter performs this role by either automatically deleting or moving to another location.

Most messages that are moved or deleted are unsolicited emails or spam messages.

Filtering of your mails helps so you ou can manage your incoming mail using filters to send email to a label, or archive, delete, star, or automatically forward your mail.

This is a way of organising your correspondence.

6 0
3 years ago
How serious are the risks to your computer security?
ASHA 777 [7]

The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

<h3>What are the risk results for information and computer security?</h3>

The term “information security risk” is known to be those  damage that occurs due to  an attacks against IT systems. IT risk is made up of a wide range of potential events, such as data breaches, regulatory enforcement actions, financial costs, and a lot more.

Some Examples of malware are viruses, worms, ransomware, spyware, and a lot others.

Hence, The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

Learn more about computer security from

brainly.com/question/12010892

#SPJ1

6 0
2 years ago
Which of the following safety and privacy features is not included in a P2P app or service?
diamong [38]

The option that should not be included in the safety and privacy features is not included in a P2P app or service is the non-inclusion of Representative call for confirming payments over $100.

<h3>What is P2P application?</h3>

This is known to be a form of Peer-to-peer payment services. They are apps or application that has its features which helps one to be able  to  to send money to other people.

Conclusively, a Representative call that is made for confirmation of payments that is over $100 should not be included as people may use this kinds of call to defraud other people.

Learn more about privacy features  from

brainly.com/question/20533576

3 0
2 years ago
Read 2 more answers
Jackson is teaching a class the concept of the binary number system. Which term will he use to refer to the leftmost bit of a bi
Fofino [41]
Most significant digit. That's the same that it's called for any number system.
5 0
3 years ago
Read 2 more answers
Other questions:
  • Sugar can be listed in many different forms except
    9·1 answer
  • What executable programs have names that are just one character long, and what do they do??
    5·1 answer
  • QUESTION: Which is not an example of a video port or cable?
    10·1 answer
  • Stealing passwords by using software code to run through various password schemes with numbers, symbols, capital letters, and ch
    6·1 answer
  • "The ability to create methods with the same name that are in different classes" is known as ________.
    14·1 answer
  • Tortise and hare race java g Modify the main class so it runs the race 100 times and reports how many times each runner wins. (T
    7·1 answer
  • A group of computers that are interconnected in order to share information or documents is called what?
    13·1 answer
  • jeff has just upgraded from windows 7 to windows 10 and he is confused. He has started several universal apps but he can't figur
    11·1 answer
  • Hi I got a new phone and my photos are taking so long to download, on Friday it was at 13000 what do I do it’s taking so long
    14·1 answer
  • You defined a shoe data type and created an instance.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!