1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LuckyWell [14K]
4 years ago
8

What is a recent technological breakthrough with an impact that can be compared to the invention of paper nearly 2,000 years ago

Computers and Technology
1 answer:
Evgesh-ka [11]4 years ago
3 0
<span>Electronic communication</span>
You might be interested in
If you attempt an edgeunity quiz is your latest attempt the one counted?
tekilochka [14]

Answer:

Hello

Explanation:

Hello profile picture of a nub how are you doing today?

8 0
3 years ago
PLS HELP!!
Vera_Pavlovna [14]

Answer:

A. f/2.8

Explanation:

A hole within a lens, through which light travels into the camera body is referred to as the APERTURE.

It is typically expressed as "f number" in photography. Basically, a fast lens is any lens with a maximum aperture of f/4 or more i.e f/2.8 , f/1.8 , f/1.4 etc.

The smaller the number is the bigger the maximum aperture is. Hence, the bigger the maximum aperture the more light that your lens will allow in.

Therefore, the ideal aperture settings for a fast lens is f/2.8

7 0
3 years ago
Which two tasks are associated with router hardening? (choose two.)?
nexus9112 [7]

Disabling unused ports and interfaces.

Securing administrative access.

Router hardening means that the router is secured against attacks as best as possible. Router hardening is one among the three areas of router security that must be maintained to secure an edge router at the network perimeter. Basically, router hardening secures from tough-to-crack passwords, to the shutting down of unnecessary interfaces, ports, and services. Look for any unused router interfaces and disable them by issuing the shutdown command. Disabling unused services typically include BOOTP, CDP, FTP, TFTP, PAD, and a few others. You can also disable administrative and management protocols currently not being  like HTTP or HTTPS, DNS, and SNMP.

8 0
3 years ago
Which operating system is used by most desktop and laptop computers?
OleMash [197]
Right know, probably Windows 7. Linux is not really used for home use and there are not many people on mac. On Windows, the most popular is still Windows 7 because XP and Vista are dead and the servers, scrap them. Then windows 8 is not great and Windows 10 is not the best for work computers so most desktops and laptops are still running Windows 7.
6 0
4 years ago
Role and importance of internet in today's world
Nadusha1986 [10]

Explanation:

In today's world Internet is the main thing in our daily life. Without it there would be a lot of troubles and we use Internet for research, watching videos etc

6 0
3 years ago
Read 2 more answers
Other questions:
  • Which ipsec component is software that handles the tasks of encrypting, authenticating, decrypting, and checking packets?
    10·1 answer
  • Which of the following statements is correct? A. The columns will be listed in the results in the same order they are stored in
    7·1 answer
  • A program is divided into 3 blocks that are being compiled on 3 parallel computers. Each block takes an Exponential amount of ti
    6·1 answer
  • Difference between switch case and if else statement.​
    11·1 answer
  • I NEED answers for these qu plz
    5·1 answer
  • What's this little?<br>​
    9·1 answer
  • How can you create a messages to look like an IMessage?
    8·1 answer
  • Use USB in a sentence
    15·2 answers
  • The specialized programs used by the operating systems to help ensure that memory is used properly and there are no memory confl
    15·1 answer
  • ____ takes care of the transport between machines. but it is unreliable, and there is no guarantee that any given packet will ar
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!