1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ExtremeBDS [4]
3 years ago
12

The internet may best be compared to a

Computers and Technology
2 answers:
liraira [26]3 years ago
7 0
I would say a calculator.
aniked [119]3 years ago
5 0
DEEP DISH PIZZA AND NETFLIX AND INTERNET IS CHILL 
You might be interested in
Mention the usage of crop concept in ms-word​
nignag [31]

Answer:

Every image editing software has a crop tool that allows you to trim or eliminate the edges of an image. Cropping tools in Ms.word allow you to hide portions of picture that you do not want to be displayed in the final result.

3 0
3 years ago
Read 2 more answers
Select the correct answer
Vaselesa [24]

Answer:

professional integrity

Explanation:

The work he is doing is comes under the violation of professional integrity. Because professional integrity is the set of ethics that should be followed by the employ. These ethics includes honesty, loyalty and dependability.

5 0
4 years ago
It is possible to make the document larger for viewing small text. <br> True or False
kirill [66]
I believe your answer is true
5 0
4 years ago
Read 2 more answers
A. Requiring computer users to log off before leaving for lunch
GuDViN [60]

Answer:

Option A, B, and D.

Explanation:

In the above question, the some details of the question are missing that is the part of the question.

Information Security applies to the mechanisms and techniques built and maintained to secure print, computerized, or any other type of personal, secret and confidential information or records from unauthorized access, usage, exploitation, release, damage, manipulation, or disturbance.

So, the following are the option that is true about the scenario.

Other option is not true about the scenario because Option C the click fraud are not the part or protect from the information security and Option F is not considered to the following scenario.

7 0
4 years ago
Given an int variable k that has already been declared, use a while loop to print a single line consisting of 88 asterisks. Use
Grace [21]

Answer:

True

Explanation:

The while loop is going to be executed until the condition is false.

Since <em>k</em> is initially equal to 1, the loop will execute 88 times. One asterisk will be printed and <em>k</em> will be incremented by one during each iteration.

When <em>k</em> becomes 89, the condition will be false (89 is not smaller or equal to 88) and the loop will stop.

6 0
3 years ago
Other questions:
  • _______ are unprocessed facts that a computer feeds on.
    5·1 answer
  • PLEASE HELP!!!!!!!!!!!
    11·2 answers
  • Dueto working at home, lack of interaction may result in ___________ professionalgrowth.
    14·1 answer
  • token is 64 bytes long (the 10-Mbps Ethernet minimum packet size), what is the average wait to receive the token on an idle netw
    6·1 answer
  • A newer kind of mobile site can do a lot of what only apps used to do, so the line has blurred between sites and apps. what are
    9·1 answer
  • SAN Security Issues: What storage security issue might come to be a greater problem in the future?
    10·1 answer
  • What file system allows you to continue to add files to a CD or DVD disc after the initial burn, as long as there is room on the
    14·1 answer
  • Charles wants to work for himself in the Transportation and Logistics career cluster. Which lists the jobs with the best
    7·2 answers
  • Although plants and ainamals are both living things___
    13·1 answer
  • What is a security strategy comprised of products and services that offer remote support for mobile devices, such as smart phone
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!