1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
WARRIOR [948]
3 years ago
12

Bitnet, one of the predecessors of the internet was launched in 1981. what does bitnet stand for?

Computers and Technology
1 answer:
svp [43]3 years ago
4 0
<span>The name BITNET originally meant "Because It's There Network", but it eventually came to mean "Because It's Time Network".</span>
You might be interested in
What is the purpose of a mail merge field?
Alex73 [517]

Answer:

to set up placeholders in a document where data will be inserted

4 0
3 years ago
Read 2 more answers
Write a brief explanation of the problems that can occur in each of the following scenarios and what you should do to avoid thes
photoshop1234 [79]
1. Horsing around can lead to breaking equipment in the classroom or somebody getting hurt

2. leaving your backpack on the floor can cause someone to fall

3.something unexpected may happen and worsen the problem

4. it can corrupt the computer's files and deleted unsaved work.

if you want the sentences to be longer, add some words to them and make the message the same.
4 0
4 years ago
Which of the following is normally mutually exclusive<br> Read only files<br> Printer<br> WIFI
marin [14]

Answer:

the answer is going to be printer

5 0
2 years ago
Edward scissorhands Of course, Jim is the villain, but who or what is the antagonist in the film? Explain in detail.
Doss [256]
Jim is the main antagonist while Edward is the main protagonist of the movie.
8 0
2 years ago
Need help asapppppppppp
TEA [102]

Answer:

artistic

Explanation:

because being it is considered a art

7 0
3 years ago
Read 2 more answers
Other questions:
  • ____ are commonly used for communication between OS components, for queuing requests to an OS service, and for exchanging messag
    5·2 answers
  • Which of the following types of access controls do not describe a lock? (a)- Directive (b)- Physical (c)- Preventative (d)- Dete
    8·1 answer
  • The Circle of Growth
    10·1 answer
  • he fundamental building block in every Hypertext Markup Language (HTML) document is the _____ tag, which marks a component in th
    7·1 answer
  • What is commodity? explain
    14·1 answer
  • A high school in New York (school A) is using videoconferencing technology to establish student interactions with another high s
    7·1 answer
  • Between Handshake protocol, change cipher suite, alert and appplication data protocols, the first one to use is:
    13·1 answer
  • I need help with writing the code in Python that draws an arrow pointing to the right.
    15·1 answer
  • A recursive method may call other methods, including calling itself. A recursive method has:
    7·1 answer
  • it just said i was blocked from brainly for a sec i was like- dang- then i logged in again then it was back to normal uHhHh can
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!