1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KATRIN_1 [288]
3 years ago
8

Where did the Internet originate

Computers and Technology
2 answers:
natali 33 [55]3 years ago
3 0
From scientists planing to share information across countries. Letters and the mail system took to long for certain situations. 
WARRIOR [948]3 years ago
3 0
Hey There!

The internet came from from scientists working at  US<span> Advanced Research Projects Agency.

Have A Brainly Day!</span>
You might be interested in
1. What does MS-DOS use for input?
Ket [755]

1. The answer is Command-line base

MS-DOS is a single user, single tasking OS that use a command line interface. MS –DOS is the perfect example of a command line interface. CLI is a text based interface used by operating systems and software and performs particular tasks by entering commands. Unlike the GUI (Graphical User Interface), the CLI uses a very easy mechanism which is not user friendly.  

2. The answer is carry electrical current

Transistors are semiconductor devices used to control the flow of electricity in circuits. They contain three layers of silicon that are used to amplify or switch electric currents. They are very fundamental in modern electronic devices and are considered one of the greatest inventions in modern history. In small quantities, transistors are used to make simple switches and digital logic. In huge quantities, transistors are interconnected and combined into small chips that create complex ICs, computer memories, and processors.

3. The answer is True

A peripheral device such as a keyboard, a mouse, or a printer is a hardware input or output device that gives the computer additional functionalities and serve as an auxiliary computer device. They are commonly known as I/O devices because they provide input and output information for the computer.

4. The answer is A: Interacts with or sends data to the computer

A peripheral device as mentioned above is used to input information into and get it out of the computer. In addition, an input device sends data, information, or instructions to the computer. Examples of input devices include, keyboard, mouse, graphics tablet, game controller, read only memory, and many more.

5. The answer is doc .

Doc file extension is the general default binary and XML-based format for Word 97 all the way to Word 2019. This file extension can contain formatted texts, tables, images, page formatting, and graphs. Depending on the versions of the Microsoft Word, the standards for the DOC extension change slightly from .doc to .docx


5 0
3 years ago
How long does it take to wire a house?
Licemer1 [7]

Answer:

the rewiring of an entire home may take up to a week. Smaller jobs, like wiring a single room, may take one to two days

Explanation:

4 0
3 years ago
Read 2 more answers
What is internet protocol? Language computers use to communicate over the internet Small files that websites put on your PC to s
Alex787 [66]

Answer:

Unique 32-bit number assigned to every machine on the internet

Explanation:

Internet Protocol is a numerical representation that uniquely identifies a device on a network, like Internet for instance. An IP address is an address used in order to uniquely identify a device on an IP network. The address is made up of 32 binary bits, which can be divisible into a network portion and host portion with the help of a subnet mask.

An IPv4 address contains 4 octets, so it's a total 32 bits long while addresses in IPv6 are 128-bits long.

7 0
3 years ago
Read 2 more answers
Tonya is working with a team of subject matter experts to diagnose a problem with her system. The experts determine that the pro
Licemer1 [7]

Answer:

The answer of the following question is Encryption.

Explanation:

Encryption is the second layer of the OSI Layer. It helps reduce the maintenance charges and offload complexity.

Encryption has presents in layer 3 and layer 4 which is IPSec in layer 3 and SSL, TSL in layer 4. of OSI Model.

<u>Note</u>- Only the Encryption can protect the data itself

5 0
3 years ago
Jeremy is designing a website for a florist. He intends to discuss the web design with his client. Which tool should Jeremy use
stiv31 [10]

Answer:

C.  layout of each page with its respective elements

Explanation:

A layout  of each page with its respective elements will give the client a good idea of the final product and help him confirm his desires/requests towards the creation of the Web site.  Most people are visual, especially about things they don't fully understand, so a clear and visual representation is best.

<u>A. Bulleted lists and titles</u>... won't give the idea of the full layout of the Web site.

<u>B. chart depicting</u>....  that's more a tool for the programmer than the client, although user flow is important, it isn't as much as the visual aspect of each page.

<u>D. pictures and screenshots of websites of other florists..</u>. That could be a useful aid on the first contact, but the question implied the Web site is already in progress... so that wouldn't help much.

<u>E.  programming code for the website</u>, absolutely not, the client hired Jeremy not to have to deal with that.

5 0
4 years ago
Other questions:
  • For an IP or device that is in the local network, it's a very straight forward cache table lookup for its MAC address. How does
    5·1 answer
  • 1) If a client requests timestamping every two minutes, how would it look? a) [00:02:00] b) [00:06:00] c) (00:04:00)
    15·2 answers
  • Pls help! ive been looking everywhere online but I couldn't find the answer to this:
    5·1 answer
  • What laptops can you get for 2500$ and should mostly using Microsoft applications.
    14·2 answers
  • Most sus color in Among Us? Red is safe I saw him scan. I'll give brainliest because why not. I'm bored.
    14·2 answers
  • A _________ is automatically launched by some trigger and appears in front of the active window
    12·1 answer
  • For what purpose is keylogging software used? a. To automatically translate input to another language as the user enters data b.
    10·1 answer
  • Video-sharing sites such as youtube and vimeo provide a place to post short videos called clips, true or false?
    10·1 answer
  • Is spin to win paying or is a scam app​
    6·2 answers
  • Check all that apply to Raster Graphics
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!