what cloud computing storage

Answers

Answer 1

Answer:

It's where data is stored on the internet via the cloud servers. This allows for access of your data pretty much anywhere you have internet depending which service you stored your data on.

Examples:
Dropbox
Amazon Web Services (AWS)
iCloud
Mega.nz


Related Questions

QUESTION NO-1: The Highest quality printer is dot-matrix True False Prev​

Answers

It is false that the Highest quality printer is basically dot-matrix.

What is dot-matrix?

A dot matrix is a patterned 2-dimensional array used to represent characters, symbols, and images.

Dot matrices are used to display information in most types of modern technology, including mobile phones, televisions, and printers. The system is also used in the textile industry for sewing, knitting, and weaving.

Dot-matrix printers are an older technology that uses pins to strike an ink ribbon in order to print characters and images on paper.

While dot-matrix printers are capable of producing multi-part forms and have low operating costs, they are generally regarded as having lower print quality when compared to more modern printer technologies.

Thus, the given statement is false.

For more details regarding dot-matrix, visit:

https://brainly.com/question/4953466

#SPJ9

what is data abstraction and data independence?​

Answers

Data abstraction and data independence are two key concepts in computer science and database management systems. They are closely related and aim to improve the efficiency, flexibility, and maintainability of data management.

What is data abstraction and data independence?

The definitions of these two are:

Data Abstraction:

Data abstraction refers to the process of hiding the implementation details of data and providing a simplified view or interface to interact with it. It allows users to focus on the essential aspects of data without being concerned about the underlying complexities. In programming languages, data abstraction is often achieved through the use of abstract data types (ADTs) or classes.

By abstracting data, programmers can create high-level representations of data entities, defining their properties and operations.

Data Independence:

Data independence refers to the ability to modify the data storage structures and organization without affecting the higher-level applications or programs that use the data. It allows for changes to be made to the database system without requiring corresponding modifications to the applications that rely on that data. Data independence provides flexibility, scalability, and ease of maintenance in database systems.

Learn more about data at:

https://brainly.com/question/179886

#SPJ1

Generate a list of ways the computer has impacted the world include both positive changes are negative changes

Answers

In several fields, computers are frequently used gadgets. It's an essential system for people, especially for those who manage businesses, industries, etc.

What are positive changes?

Cars and jets were created using computers, traffic signals were controlled by computers, most medical equipment was created using computers, and space exploration was initiated using computers.

Computer use is necessary for the majority of jobs nowadays. Notwithstanding several flaws, such as the Windows bug nvspcap64.dll problem, these "mechanical brains" had a significant social impact.

Every system has both positive and negative effects, but the negative effects should predominate.

Therefore, In several fields, computers are frequently used gadgets. It's an essential system for people, especially for those who manage businesses, industries, etc.

To learn more about computer, refer to the link:

https://brainly.com/question/21080395

#SPJ9

What is the best thing to do if you only want your close friends to be able to see your posts?
A
Avoid posting details about your life.

B
Check your privacy settings.

C
Choose your posts carefully.

D
Only post photos instead of comments.

Answers

The answer is B (check your privacy settings) because almost all apps and websites have privacy settings that give you some options for who is allowed to see your posts.

Also, the other three answer choices don’t really respond to the question because they are not about who sees your posts, but what your posts are about.

Answer:

check privacy settings. There will be a filter i am pretty sure :)

Digital cameras have electronic sensors that record information to create pictures. What acronym refers to the sensitivity
of the electronic sensor?
DPI
ISO
LED
DMD

Answers

Answer:

ISO

Explanation:

A signal travels from point A to point B. At point A, the signal power is 100 W. At point B, the power is 90 W. What is the attenuation in decibels?

Answers

Answer:

\(Attenuation = 0.458\ db\)

Explanation:

Given

Power at point A = 100W

Power at point B = 90W

Required

Determine the attenuation in decibels

Attenuation is calculated using the following formula

\(Attenuation = 10Log_{10}\frac{P_s}{P_d}\)

Where \(P_s = Power\ Inpu\)t and \(P_d = Power\ outpu\)t

\(P_s = 100W\)

\(P_d = 90W\)

Substitute these values in the given formula

\(Attenuation = 10Log_{10}\frac{P_s}{P_d}\)

\(Attenuation = 10Log_{10}\frac{100}{90}\)

\(Attenuation = 10 * 0.04575749056\)

\(Attenuation = 0.4575749056\)

\(Attenuation = 0.458\ db\) (Approximated)

How to do a row of circles on python , with the commands , picture is with it .

How to do a row of circles on python , with the commands , picture is with it .

Answers

Answer:

o.o

Explanation:

The following are types of numbers except one. Select the one which is not an integer.
A. Float
B. Int
C. Long
D. Boolean

Answers

Answer:

D) Boolean

Explanation:

Int, Float, Long and Boolean are commonly used data types in programming languages. Of these data types, the Boolean data type, named after George Boole, does not represent a numerical value. Rather it has one of two possible values, True and False. These values represent the two truth values of logic and Boolean algebra.

The Boolean data type is basically associated with conditional statements which specifies different actions to be taken depending on whether the Boolean condition evaluates to true or false. Therefore it influences the control flow of a program.

A customer calls in and is very upset with recent service she received. You are trying to calm the customer down to come to a resolution but you are not sure how to best do so

Answers

It's crucial to maintain your composure and show empathy while interacting with a frustrated customer. Actively listen to their worries and express your regret for any hardship you may have caused.

Can you describe a moment where you dealt with an angry or upset customer in the past?

You can use the STAR approach to share a tale about a time when you had to face an irate client in person. Situation: "A client arrived at my former employment screaming and cursing the workers. She was lamenting because she didn't have her receipt when she tried to return an item.

What are the 5 C's of complaint?

The 5Cs approach of formal presentation, where the Cs stand for Principal complaint, Course of sickness.

To know more about customer visit:-

https://brainly.com/question/13472502

#SPJ1

what is difference between augmented reality and mixed reality?​

Answers

Answer:

Explanation:

Augmented reality (AR) overlays computer-generated content on top of the real world. ... Mixed reality (MR) is like AR on steroïds in that it projects 3D digital content that is spacially aware and responsive. With mixed reality, virtual objects become part of the real world

The difference between augmented reality and mixed reality is that;

Augmented Reality uses digital elements with the aid of a camera while mixed reality uses elements from both augmented reality and virtual reality

What is Augmented Reality and Mixed Reality?

Augmented reality (AR) is a type of reality that adds digital elements to a live view with the aid of a camera on a smartphone. Some examples of augmented reality experiences are Sn ap ch at lenses and the game P okemon Go.

Mixed Reality (MR) is a reality that utilizes a combination of elements in both Augmented Reality and Virtual Reality and as such real-world and digital objects interact through it. A very good example of this mixed reality is Microsoft’s HoloLens.

Read more about Augmented Reality at; https://brainly.com/question/26507094

Can someone tell me how can you give brainliest to ppl

Answers

hey!

When two users given an answer to the question (to your asked question),then you can see a crown symbol written as mark as brainliest . Click on it and mark.

Answer:

Basically, wait for 2 people to answer.

Explanation:

Then after 2 people answers, there will be a crown on both answers.

Then, you can click that crown to whoever you think the best answer is.

I hope this helps!

Which of the following is a snooping malware?

Answers

In computer technology, a typical example of a snooping malware is a keylogger.

What is a keylogger?

A keylogger is also referred to as a keyboard capture or keystroke logger and it can be defined as an activity-monitoring software program that is typically designed and developed to monitor, snoop, record and share a user's personal data with a cyberattacker or hacker.

This ultimately implies that, a typical example of a snooping malware is a keylogger because it can be used to monitor a users activities on a computer system.

Read more on keylogger here: brainly.com/question/17231901

#SPJ1

which is the best cpu

Answers

Ryzen 9 for sure in my opinion

translate each of the following boolean expressions into java. the sky is blue or today is not monday.

Answers

Just use a NOT operator in front of the original Boolean expression and your negated Boolean expression is ready! For example, PHP. Java, C++, C#

A Boolean articulation is a consistent explanation that is either Obvious or Bogus . As long as both parts of a bolean expression have the same fundamental data type, they can compare any type of data. Data can be tested to determine whether it is the same as, higher than, or lower than other data.  The Boolean operators OR, AND, and NOT are present in the majority of programming languages; These are denoted by "||," a double pipe character, "&&," and "!" in C and some languages derived from it. exclamation point), whereas the bitwise operations are represented by "|," "&," and "" (tilde). In the mathematical literature, the symbols used are typically "+" (plus), "" (dot), and overbar, or "" (vel), "" (et), and "" (not), or "′" (prime). There are two sets of Boolean operators in some languages, such as Ruby and Perl, with identical functions but distinct precedence. The lower precedence operators are typically used instead in these languages with and, or, and. Instead of a separate Boolean type, some PL/I-derived programming languages use BIT instead of a bit string type. Boolean and bitwise operations both use the same operators in those languages. The characters "|," "&," "" (infix), and "" (prefix) are used in languages to represent OR, AND, NOT, and EXCLUSIVE OR.

To know more about NOT operator visit https://brainly.com/question/20916293?referrer=searchResults

#SPJ4

If democratic powers stop supporting free and independent media in their own countries and do not impose consequences on governments that restrict it, what could happen to the free press?

It could become extinct.
It could stop creating fake news.
It could improve its reporting.
It could become more honest.

Answers

Answer:

It could become extinct.

Explanation:

2. Which is not part of the Sans Institutes Audit process?
Help to translate the business needs into technical or operational needs.
O Deler a report.
O Define the audit scope and limitations.
O Feedback based on the

Answers

Answer:

Help to translate the business needs into technical or operational needs. This is not a part.

Explanation:

Capital budgeting simply refers to the process that is used by a business in order to determine the fixed asset purchases that is proposed which it should accept, or not. It's typically done in order to select the investment that's most profitable for a company.

Some of the capital budgeting processes include:

Identification and analysis of potential capital investments.

Application of capital rationing

Performing post-audits

It should be noted that developing short-term operating strategies​ is not part of the capital budgeting process.

Learn more about investments on:

https://brainly.com/question/15105766

#SPJ2

The web development team is having difficulty connecting by ssh to your local web server, and you notice the proper rule is missing from the firewall. What port number would you open on your webserver?

a. Port 21
b. Port 22
c .Port 25
d. Port 80
e. Port 443

Answers

Answer:

Option b (Port 22) seems to the appropriate choice.

Explanation:

Below seem to be some measure you should take to correct this mistake.

Verify whether Droplet's host IP address seems to be right.  Verify existing connection supports communication over all the utilized SSH port. Any access points can be able to block port 22 and sometimes customized SSH. For illustration, you could do this by checking different hosts who used the same port, using only a recognized working SSH connection. These could help you identify unless the current problem is not particular to clients' Droplet. Authenticate the Droplet configuration settings. Verify that they're not being configured to DROP 's preferred policy, and do not apply the port to require connectivity.

The SSH server also operates on port 22, by default.  

Other choices don't apply to the specified scenario. So that the argument presented above will be appropriate.

The port number would you open on your webserver is Port 22

For better understanding let's explain SSH means.

Service Name and Transport Protocol Port Number Registry. where the service name is Secure Shell (SSH) Protocol and it has the port number of 22 therefore this mean that SSH will only work with port 22 using it for other port will only result in difficulty in connection. SSH has other names like Secure Shell or Secure Socket Shell. it is known as a network protocol that helps its users with system administrator.

From the above we can therefore say that the answer The port number would you open on your webserver is Port 22, is correct

Learn more about SSH and port from:

https://brainly.com/question/13054022

How do you increase the number of tries by one?

tries.add(1)

tries = tries + 1

tries = 1

Answers

Answer:

tries = tries + 1

Explanation:

This is a universal way to increment your variable. In some languages, the following notation also works:

tries++;

tries += 1;

Again, it depends upon the language you are using. Each language has it's own syntax.

who was Widely regarded as the world's first computer programmer

Answers

Answer:

Ada Lovelace

The world’s first computer programmer was a woman named Ada Lovelace. Born in Britain on December 10, 1815, she was introduced to the concept of the calculating machines developed by Charles Babbage when she was 17. It was in 1842 that she became thoroughly involved in what we call today computer programming.

Explanation:

Which answer below is NOT a function of a Data Scientist? O Data Exploitation O Data Strategies O Data Modeling O Data Preperation

Answers

Answer:

uh

Explanation:

yesyesyesyesyesyeysyeys

A hacker gains access to a web server and reads the credit card numbers stored on that server. Which security principle is violated? Group of answer choices Authenticity Integrity Availability Confidentiality PreviousNext

Answers

Answer:

Confidentiality

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In Cybersecurity, there are certain security standards, frameworks, antivirus utility, and best practices that must be adopted to ensure there's a formidable wall to prevent data corruption by malwares or viruses, protect data and any unauthorized access or usage of the system network.

In this scenario, a hacker gains access to a web server and reads the credit card numbers stored on that server. Thus, the security principle which is violated is confidentiality.

Confidentiality refers to the act of sharing an information that is expected to be kept secret, especially between the parties involved. Thus, a confidential information is a secret information that mustn't be shared with the general public.

This ultimately implies that, confidentiality requires that access to collected data be limited only to authorized staffs or persons.

Select the correct answer from each drop-down menu. What data types can you suggest for the given scenario? Adja is working in a program for the school grading system. She needs to use a(n) (First drop down) to store the name of the student and a(n) array of (Second drop down) to store all the grade of each subject of each student.
Options for the first drop down are- A. Integer, B.String, C.Character.
Options for the second drop down are- A.Floats, B.Character, C.String.

Answers

Based on the given scenarios, the data types that would be best suited for each is:

C. Character.A. Floats

What is a Data Type?

This refers to the particular type of data item that is used in order to define values that can be taken or used in a programming language.

Hence, it can be seen that based on the fact that Adja is working in a program for the school grading system, she would need to use a character to store the name of the student and a float to store all the grades of each subject of each student because they are in decimals.

With this in mind, one can see that the answers have been provided above.,

In lieu of this, the correct answer to the given question that have been given above are character and floats.

Read more about data types here:

https://brainly.com/question/179886

#SPJ1

Answer:

A- String

B- Character

want to.learn about computers​

Answers

Yes...I do want to learn about computer

The range of Cell that go across the spread sheet and are identified by numbers is called​

Answers

Cells are identified by the Cell Name (or Reference, which is found by combining the Column Letter with the Row Number. For example the cell in Column "C" in Row "3" would be cell C3. Cells may contain Labels, Numbers, Formulas or Functions. Cell Name: By default, the name of a cell is the cell reference.

Hope this helps

15. Virus cannot infect files that are saved in i. USB ii. CD-ROMs iii. Memory card iv. All of them​

Answers

Answer:

all of them

Explanation:

but Virus can infect them if u plug them in infected computer .

Answer: CD Roms.  Virses can infect each other item by actually writing to the device.  For CD Roms, you must have a special writer program to write to the ROM.  

Explanation:

You want to see data on charters flown by either Robert Williams (employee number 105) or Elizabeth Travis (employee number 109) as pilot or copilot, but not charters flown by both of them. Create the table that would result from applying the SELECT and PROJECT relational operators to the CHARTER table to return only the CHAR_TRIP, CHAR_PILOT, and CHAR_COPILOT attributes for charters flown by either employee 105 or employee 109.

Answers

Answer:

So, what is the question?!

Explanation:

16. The Nintendo Entertainment System (NES) saw its sales skyrocket as a result of the launch of which of the following games?
a) Pac-Man
b) Super Mario Bros
c) The Legend of Zelda
d) Popeye

Answers

Answer:

Super Mario bros

Explanation:

how do engineers communicate their design ideas?

Answers

Answer:

Explanation:

Mechanical engineers give Presentations when they work on projects and Proposals. Often, professional Presentations require you to verbally and graphically present preliminary designs to colleagues.

Hope this helped!!!

In Java only please:
4.15 LAB: Mad Lib - loops
Mad Libs are activities that have a person provide various words, which are then used to complete a short story in unexpected (and hopefully funny) ways.

Write a program that takes a string and an integer as input, and outputs a sentence using the input values as shown in the example below. The program repeats until the input string is quit and disregards the integer input that follows.

Ex: If the input is:

apples 5
shoes 2
quit 0
the output is:

Eating 5 apples a day keeps you happy and healthy.
Eating 2 shoes a day keeps you happy and healthy

Answers

Answer:

Explanation:

import java.util.Scanner;

public class MadLibs {

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       String word;

       int number;

       do {

           System.out.print("Enter a word: ");

           word = input.next();

           if (word.equals("quit")) {

               break;

           }

           System.out.print("Enter a number: ");

           number = input.nextInt();

           System.out.println("Eating " + number + " " + word + " a day keeps you happy and healthy.");

       } while (true);

       System.out.println("Goodbye!");

   }

}

In this program, we use a do-while loop to repeatedly ask the user for a word and a number. The loop continues until the user enters the word "quit". Inside the loop, we read the input values using Scanner and then output the sentence using the input values.

Make sure to save the program with the filename "MadLibs.java" and compile and run it using a Java compiler or IDE.

Why is it important to know how to create a professional email?

Answers

So people think you are professional based on what you write.

Answer:

It is important to write a professional email because you need to make a good impression. This also shows that you are determined.

Other Questions
15. Which macronutrient comes from turkey, eggs, and dairy products?carbohydratesproteinsfats Does a hypothesis explains what the scientist thinks will happen during the experiment. 3. a. For what interval(s) is h(x) = 2x + 10 positive? Should African artifacts be returned to Africa? Why or why not? Support your claim with 3 pieces of evidence. In relational exchange theory, the exchange governance norm that bonds channel members based on a common purpose is Group of answer choices Solidarity No answer text provided. Role integrity Mutuality what is the primary intent of applied sociology? multiple choice question. to create a bridge between sociology and psychology to yield research that will be of use to other sociologists to yield practical applications for human behavior and organizations to provide continuing education for social scientists what is the meaning of the word scaffed jasmine believes that it is the obligation of the state government to ensure that all corporations eliminate toxic emissions from their manufacturing facilities. jasmine believes that government should act as secretion of parathyroid hormone is regulated by which of the following? a.the level of ionized calcium (ca2 ) in the blood b.trophic hormones secreted by the anterior lobe of the pituitary gland c.the level of adrenocortical hormones in the blood d.none of the above How can you use the career to-do list assignment in geb 3006 to learn how majors relate to career choices? a young person from southern california has four german grandparents. they lived in los angeles all of their life before accepting a job in milwaukee. they have never really thought about their german heritage. in milwaukee, they discover many other people with similar ancestries and begin using their ethnicity as a way to develop social and professional relationships. of what is this an example? group of answer choices situational ethnicity symbolic ethnicity passing the disparities in racial consequences Perform the indicated operation and simplify the result.(Tell me if its too blurry) for 2022 tax years, which of the following taxpayers is subject to the excess business loss limitation? multiple choice delta corporation, which incurred a $(2 million) business loss this year. kenny, who is married filing a joint return and incurred a $(675,000) business loss this year. letgo partnership, which incurred a $(730,000) business loss this year. linda, a single individual, who is a 50 percent partner in qt partnership. this year, qt incurred a business loss of $(300,000). At a 100% annual interest rate, a rational investor would be indifferent about choosing between receiving $20 today and:_____. 1. Wo wohnen Claudia und Sonja? 2. Woher kommen die zwei Mdchen? 3. Wohin gehen Sonja und Claudia jetzt? 4. Wer spielt am Sonnabend und am Sonntag? 5. Gibt es fr das Rockkonzert Karten? 6. Sind Sonjas Karten fr Sonnabend? 7. Wer kommt heute aus Dresden? 8. Wann kommt er immer? 9. Wie ist Tilo? 10. Wann macht Sonja die Hausaufgaben mit Claudias Schwester? Your friend is looking to launch a new hotel chain, Roxy Inc., designed to serve the traveling needs of the budget-minded millennial traveler. To launch Roxy Inc., she is expected to invest $500 million this year (year=0). The hotel chain is expected to generate free cash flows of $27 million per year, starting in year 1. Thereafter, these free cash-flows are expected to grow at 3 percent per year in perpetuity. For simplicity, assume these cash-flows are received at the end of each year. Your friend knows you've been taking this class, so she asked you to assess the potential value of the new hotel chain. To help you, she gives you the following reports for a handful of publicly-traded firms, as well as the expected returns on the government bond (Treasury), and the risk premium on the value-weighted market portfolio: Market Market Value of Value of Equity Company Equity Debt Beta Dropbox 900 150 2 Ikea 1,000 100 2.3 Intercontinental Hotels Group 7,500 2,500 10-year Treasury rate 2.0% Expected Market Risk Premium 5.0% 1.6 Assume throughout that the CAPM holds for all assets, and that the debt of Dropbox, Ikea, and Intercontinental Hotel Group is risk-free. None of these firms hold (excess) cash asset At the beginning of the year, accounts receivable were $30,000, and the allowance for bad debts was $1,500. During the year, sales (all on account) were $100,000, cash collections were $94,000, bad debts expense totaled $2,000, and $1,000 of accounts receivable were written off as bad debts."Required:Calculate the balances at the end of the year for the Accounts Receivable and Allowance for Bad Debts accounts. (Hint: Use T-accounts to analyze each of these accounts, plug in the amounts that you know, and solve for the ending balances.) prove that if g is a finite group, the index of z(g) cannot be prime In a local bagel shop, the number of plain bagels soldin one month increased as the number of onion bagelsincreased. Is this an example of a positive correlation,negative correlation, or no correlation? which of the following is a false statement? multiple choice risky investments may produce large losses. risky investments may produce large gains. the coefficient of variation is a risk measure. risk-averse investors cannot be induced to invest in risky assets.