1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tamiku [17]
2 years ago
6

The internet is ________. an internal communication system for businesses a large network of networks a communication system for

the u.s. navy the same as the web
Computers and Technology
1 answer:
uranmaximum [27]2 years ago
4 0

A large network of networks

<h3>What Is a large network?</h3>
  • It is the biggest network that connects computers across the world. With the internet, people can share data and files over the internet. The Internet is defined as a network of networks Hence it is the correct option

To learn more about the network, refer

to https://brainly.in/question/32165678

#SPJ4

You might be interested in
A representation of something by using a description, summary or image.
ANTONII [103]

Answer: Thumbnail

Explanation:

Thumbnail is a representation of something by using a description, summary or image.

Thumbnails are simply the versions of either pictures or videos that have been reduced and can be used as placeholder for a multimedia content. A thumbnail that is used by a company on the internet gives the first impression of the product of the company to the prospective customers.

3 0
3 years ago
Jerry has received an email on his company’s email system. The email is in regard to a new update the company plans to implement
Alla [95]

Answer:

The type of attack is <em>Phising Email.</em>

<em />

Explanation:

Phishing emails are mails purportedly sent by a company staff seeking some vital information from an employee or employees. Criminals often use such method to get sensitive information about a company and its details from its own employees who may not be able to differentiate such mails from the normal company mails. Thus the mail that Jerry receives regarding a new update the administrators of his company intends to implement can be regarded as a Phishing email.

5 0
3 years ago
You have a folder on your Windows desktop system that you would like to share with members of your development team. Users need
horrorfan [7]

Answer:

modify the NTFS permissions on the folder

Explanation:

In order to solve this problem what you need to do is to modify the NTFS permissions on the folder. The NT File System permissions are security measures blocking access to manipulation of files within a directory and affects local users as well as network users. By adjusting the permissions of this within the folder that the members are trying to access then it will give them the ability to modify the files.

5 0
3 years ago
Create a text file named employee.dat containing the following data: b. Write a C++ program to read the employee.dat file create
Paul [167]

Answer:

1000 500 250 125 the output

Explanation:

write a program using integers userNum and x as input,  userNum divided by

x four times.  EX : If  the input is 2000 2 the output is 1000 500 250 125

8 0
3 years ago
16. A/An __________ is operated on the principle that the dying have special needs and wants that hospital personnel are too bus
marta [7]

Answer:

Hospices

Explanation:

A/An <u>Hospices</u> is operated on the principle that the dying have special needs and wants that hospital personnel are too busy to handle.

5 0
2 years ago
Read 2 more answers
Other questions:
  • Which of the following is a list of input devices?
    13·2 answers
  • In which situation will file compression be required to complete the task
    15·1 answer
  • 30
    5·1 answer
  • Where will the CPU store data for easy access and quick retrieval during these computations?
    13·1 answer
  • An information security ________ is a specification of a model to be followed during the design, selection, and initial and ongo
    11·2 answers
  • A blue NFiPA label indicates: A) Health Hazard B) Special information C) Flammability D) Reactivity
    6·2 answers
  • A browser allows you to set preferences for using the browser. These preferences include all of the following except
    7·1 answer
  • What do financial planning skills ultimately enable an individual to do?
    10·2 answers
  • Specifications that establish the compatibility of products and the ability to communicate in a network are called:
    10·1 answer
  • Demons I shall be your eternal nightmare
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!