1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vaieri [72.5K]
3 years ago
8

The Internet may best be compared to a/an

Computers and Technology
1 answer:
Usimov [2.4K]3 years ago
3 0
A volcano because its always erupting
You might be interested in
What does "Forward" in emails do?​
tatuchka [14]
Basically just want to make your your email is easy
4 0
3 years ago
Which of the following feature are parts of Toyota’s safety system?
ElenaW [278]
What are the options?
7 0
2 years ago
A customer contacts the help disk stating a laptop does not remain charged for more than 30 minutes and will not charge more tha
fenix001 [56]

Answer:

A. LCD power inverter

B. AC adapter

C. Battery

4 0
3 years ago
A ____________ would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a____________
Lynna [10]

Answer:

vulnerability, risk

Explanation:

A vulnerability would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a risk is a combination of the likelihood that such a misconfiguration could happen, a hacker’s exploitation of it, and the impact if the event occurred.

6 0
3 years ago
When saving a memo you created in Word, which one of the following extensions is automatically assigned to the document?
VMariaS [17]
What are the options and if it's meaning like when you save something it has .pdf .jpg or .doc after the title then it would be ".doc"
8 0
3 years ago
Other questions:
  • What are the uses of a modem
    5·1 answer
  • Learning about public speaking can help improve your ________________.
    15·1 answer
  • Which type of drawer has three dispensing modes: single-dose, multi-dose, and matrix?
    13·1 answer
  • Which technology can be used to protect the privacy rights of individuals and simultaneously allow organizations to analyze data
    13·1 answer
  • Suppose the file is sent continuously as one big message. how long does it take to send the file, assuming it is sent continuous
    15·1 answer
  • Networks that are designed to connect similar computers that share data and software with each other are called:
    10·1 answer
  • EXCEL 2016:
    8·2 answers
  • Explain the three schemes via which the binding of instructions and data to memory addresses can be done. In each scheme, how th
    13·1 answer
  • Microsoft Access is a
    10·1 answer
  • I WILL GIVS BRAINLIEST IF U ANSWER THIS
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!