1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimaraw [331]
3 years ago
15

Which is NOT an event associated with the beginning of the internet

Computers and Technology
1 answer:
sammy [17]3 years ago
8 0

Answer:

when Gandhi was born he had nothing to do with the internet. nothing can connect Gandhi to the internet.

Explanation:

Gandhi was an Indian activist who was the leader of the Indian independence movement against British colonial rule. therefore, there is no connection.

You might be interested in
To quickly modify fonts, colors, and effects on a slide, a user can modify the _____. (Microsoft PowerPoint)
velikii [3]

<u>Answer</u>:

To quickly modify fonts, colours, and effects on a slide, a user can modify the Theme.

<u>Explanation</u>:

In Microsoft power point a theme is a group or collection of fonts , colours and effects that are pre-formatted to improve or enhance the presentation. We can  start changing the font , colours or effects or any pre-existing  themes  by selecting them.  

To Change colour:

  • In Design tab,  under the  Variants group, click on  the downward  and choose one colour from the colour variant gallery.
  • Now click on the customise colours which opens the  "Create New Theme Colours" dialog box. In this dialog box , in the  theme colours  we can make the necessary changes and save them as a new theme.

To change fonts:

  • In the View tab, choose Slide Master.In this tab, select "Fonts" and then select Customise Fonts.
  • Now "Create New Theme Fonts" dialog box opens where use can choose the required font size under the Heading font and Body font boxes.  Again this can be saved as a new theme. Changing the font of theme changes all the bullet texts and title.
7 0
3 years ago
During a move, employee workstations were disconnected from the network and reconnected in new offices. However, after the move
Troyanec [42]

Answer:

Make sure the cables are functional and properly plugged.

Explanation:

For the fact that everything was working perfectly before the move, but after the move, it was noticed that a few workstations cannot get a valid IP, the first thing that is required to be checked is to ensure that the cables are properly plugged, and if they are, make sure that you test for the functionality of the cables. It is only after these checks and the problem persist, that further troubleshooting is required.

5 0
3 years ago
Session Hijacking refers to the exploitation of a valid computer session where an attacker takes over a session between two comp
noname [10]

Answer:Weak session ID generation algorithm

Explanation: Session hijacking is the hacking by disguising as the authenticated user and illegally exploit the particular computer session. IP packets are invoked by the disguised attacker into the active session between the legal computer user. It is also called session key.

It gives the hacker to use the data and services of the computer in an unauthorized manner. It arises due to the session of communication are not secure and strong,key used for session is weak etc.

5 0
3 years ago
Ou have an application running on Oracle Cloud Infrastructure. You identified that the read and write operations are slowing you
Otrada [13]

Answer:

Options A and C.

Explanation:

In Oracle Cloud Infrastructure the two options which allows you to increase disk performance are;

1. Terminate the compute instance preserving the boot volume. Create a new compute instance using a VM Dense IO shape using the boot volume preserved.

2. Create a backup of the boot volume. Create a new compute instance a VM Dense IO shape and restore the backup.

3 0
3 years ago
An extrant is designed for the exclusive use within an organization true or false
olga2289 [7]
That would be false.  The correct term is "intranet"
6 0
3 years ago
Other questions:
  • Judy forgot where she saved a certain file on her computer. Therefore, she searches for all files with a .jpg file extension. Wh
    10·2 answers
  • Write a program that reads numbers from a file (or allow user to input data) and creates an ordered binary tree. The program sho
    8·1 answer
  • After the following code runs, what will be the value of result? var x = 30; function get () { return x; } function set (value)
    10·1 answer
  • Communications that take the form of electronic junk mail or unsolicited e-mail are referred to as
    13·2 answers
  • How does the text recommend that a company operate if it wants to be successful in the information age?
    11·1 answer
  • What does ctto mean?
    11·2 answers
  • Exercise 4: Bring in program grades.cpp and grades.txt from the Lab 10 folder. Fill in the code in bold so that the data is prop
    12·1 answer
  • Which of the following is not true about network design?Group of answer choicesIn designing LAN networks, network designers tend
    11·1 answer
  • Autumn suffers from nocturnal dyspnea. This term describes a breathing condition but using the prefixes to translate, it means:
    5·1 answer
  • Write the function greeting that takes a string as input. That string will be formatted as Name Age Hobby, without any punctuati
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!