1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
balu736 [363]
2 years ago
14

The agency that started ARPANET was looking for

Computers and Technology
1 answer:
iogann1982 [59]2 years ago
4 0

Answer:the military

d

You might be interested in
Which best describes the benefits of renting a home? ARenting can cost more upfront. BRenting is less flexible than owning a hom
yulyashka [42]

Renting can be an alternative to many people, especially those in areas where house prices are very expensive. The benefits to renting a home, however, are not mentioned in the given question, making the best answer (D) none of the above.

Some actual benefits that a person can gain are actually flexibility, since renting means that you can easily move from one place to another compared to buying a home, where you require capital and selling the previous home also falls into your responsibility, while rentals are managed by landlords.

8 0
4 years ago
Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outside atta
Alik [6]

Answer:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

Explanation:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:

  1. It defines what is required from organization’s employees for the security of the IT systems
  2. Information security policies provide a means to secure the organization against external and internal threats
  3. Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities
  4. Information security policies are created to hold each employee responsible with regard to information security
4 0
3 years ago
What humidity level should be maintained for computing equipment? a. 50 percent b. 40 percent c. 60 percent d. 30 percent
sashaice [31]

Answer:

A. 50 percent

Explanation:

The correct option is - A. 50 percent

Another preventive measure you can take is to maintain the relative humidity at around 50 percent. Be careful not to increase the humidity too far—to the point where moisture starts to condense on the equipment.

8 0
3 years ago
100 points !!! Some games fall under more than one category. For example, many racing games allow players to modify the cars the
Ugo [173]

Answer:

game 1: roblox, its not technically a game, however it contains game that could fall under more than one category. Game 2: Dungeons and Dragons could fall under role play and also adventure

Explanation:

7 0
3 years ago
Read 2 more answers
Hãy giúp tôi giảiiii​
Kazeer [188]

Answer:

fiikslid wugx uesbuluss wuz euzsbwzube

8 0
3 years ago
Other questions:
  • What is a negative impact of digital communication
    6·1 answer
  • All of the following are methods of communication
    8·2 answers
  • 1)Ce procent de grasimi putem găsi in lapte ?
    10·1 answer
  • 6.5 Code Practice: Question 1 please help with code!!! Thank you
    12·1 answer
  • The worlds two highest dams are both in tajikistan. the rogun dam is 35 meters taller than the nurek dam. together they are 635
    13·1 answer
  • _____ creates a border or space that separates information.
    14·1 answer
  • Please as soon as possible
    13·1 answer
  • Kamal plans to offer new, more favorable contracts to business customers who are now receiving a discount and use wireless servi
    7·1 answer
  • What is python, the coding language
    6·2 answers
  • What does the following code print?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!