1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KATRIN_1 [288]
3 years ago
8

Where did the Internet originate

Computers and Technology
2 answers:
natali 33 [55]3 years ago
3 0
From scientists planing to share information across countries. Letters and the mail system took to long for certain situations. 
WARRIOR [948]3 years ago
3 0
Hey There!

The internet came from from scientists working at  US<span> Advanced Research Projects Agency.

Have A Brainly Day!</span>
You might be interested in
Alice recently purchased a new cell phone. After her vacation, Alice wanted to transfer her holiday photos to her computer to do
dmitriy555 [2]

Answer:

<u>D.) Device Manager</u>

Explanation:

Indeed, the device manager administrative tool found on Windows allows the user to set up or add new hardware devices attached to the computer system.

For example, this tool allows the user to add external devices to the computer such as a printer, mobile device, etc that may not automatically be displayed.

5 0
3 years ago
By Definition, a Small Business?
Strike441 [17]

Answer:

A small business is a privately owned and operated business. A small business typically has a small number of employees.

Hope this helped you!

Explanation:

4 0
3 years ago
Read the paragraph.
aleksandrvk [35]

Answer:

I think sentence 3 bc it doesn't really make any sense Ik it's explaining it but it doesnt connect with the whole story as much I think it has to have more details

5 0
3 years ago
Read 2 more answers
Which method is an easy way to find a short description of a function?
yuradex [85]

Answer:

A...In the Insert Function dialog box, click the function name to get a short description.

Explanation:

would be A

6 0
3 years ago
Read 2 more answers
Which technology will a business use to identify unauthorized access to intranet sites or files by its employees?
monitta

Answer:

Computer Forensics

Explanation:

Your Welcome....

8 0
2 years ago
Other questions:
  • Suppose you have a certain amount of money in a savings account that earns compound monthly interest, and you want to calculate
    10·2 answers
  • Which player type focuses on level progression?
    13·1 answer
  • What is the recommended secure protocol for voice and video applications? secure real-time transport protocol (srtp) hypertext t
    9·1 answer
  • Person-name: String+setName(String name): void+getName(): String^Student-studentID: long+Student(String sname, long sid)+setID()
    10·1 answer
  • Circular errors are caused by adding the cell name of a/an _______ cell to a formula.
    6·2 answers
  • Visit the quick access toolbar to find help when looking for certain commands. True False
    15·2 answers
  • Type the correct answer in the box. Spell all words correctly.
    15·2 answers
  • What is the role of science and technology in achieving human’s ultimate goal or the good life?
    8·2 answers
  • PLEASE HELP!
    14·2 answers
  • If a computer uses 500 characters, how many bits this system requires to give different code to all characters?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!