1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marianna [84]
3 years ago
14

What do you think is the most fascinating aspect of the internet?

Computers and Technology
1 answer:
timofeeve [1]3 years ago
7 0
I think the most fascinating aspect of the internet is the information it produces. You can access information on different topics from the comfort of your own home, office or anywhere else. Think of a world without the internet. A world without the internet will loose a lot of it's people daily. The reason is because, imagine if there is a tsunami coming. Because there is no internet, many people will not know the weather forecast. The only people that will hear about the tsunami are those that work with satellite networks. So then, what will happen? A country can have it's people wiped out, and have only satellite network workers  left. What if there are only two satellite network workers and they can't have kids. So that country will be wiped out because of the fact that they didn't have access to information. Hope i helped. 
You might be interested in
Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outside atta
Alik [6]

Answer:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

Explanation:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:

  1. It defines what is required from organization’s employees for the security of the IT systems
  2. Information security policies provide a means to secure the organization against external and internal threats
  3. Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities
  4. Information security policies are created to hold each employee responsible with regard to information security
4 0
3 years ago
I need help with this plz! It’s for a test and I really need help
Bas_tet [7]

Answer:

c

Explanation:

assuming you are coding in python and have not install any calculation codes, the answer is most likely c

4 0
3 years ago
The programming interface for a legacy motor controller accepts commands as binary strings of variable lengths.
victus00 [196]

Answer:

The answer is "Option a"

Explanation:

The given question is incomplete, that's why its correct solution can be defined as follows:

The above-given question is the part of the Binary Autocomplete, in which this Autocomplete function would be a full word or sentence after just a few other letters were entered into the system. It approach improves text taking appropriate on smartphone devices of particular because every letter should not be written in such a single phrase.  

3 0
3 years ago
I really need the answer now!!
guajiro [1.7K]

Answer:

3. B.

4. B.

5. B.

6. C.

7. D.

8. C.

9. C.

10. D.

Explanation:

I hope I helped you.

4 0
2 years ago
Question # 4
arlik [135]

Answer:

Explanatio Morse code

4 0
3 years ago
Other questions:
  • Which speaker port should you use when connecting a single speaker to a pc?
    6·1 answer
  • Xavier would like to change the sort options for his contacts. In which tab will he find the Arrangement command group?
    6·1 answer
  • During the design phase of the systems development life cycle (SDLC), the _____ design is created for a specific platform, such
    8·1 answer
  • -Convert the 1's complement 10111010 to decimal
    15·2 answers
  • Very Short Answer Type Question (any 9)
    12·1 answer
  • For questions 3-6, consider the following two-dimensional array:
    11·2 answers
  • I WILL GIVE BRAINLIST THING TO WHOEVER GIVES ME THE CORRECT ANSWER
    11·1 answer
  • 100 POINTS!!!!!!!
    15·2 answers
  • Which new development in malware caused sandbox technology to automate and introduce artificial intelligence learning
    14·1 answer
  • To set up scenarios,then set up a list, then set up the reference cell. to set up the cells that display the output results from
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!