1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ddd [48]
3 years ago
14

The technology behind the Internet and E-mail dates back as far as 1969. What two software innovations helped the Internet becom

e user-friendly to the average computer user?
Computers and Technology
1 answer:
Alla [95]3 years ago
7 0
DOS and Windows, DOS was a generation before windows came out. (Not certain, you might want to research it a little)
You might be interested in
Which option in a Task element within Outlook indicates that the task is scheduled and will be completed on a later
joja [24]
I think it’s in progress
5 0
2 years ago
Read 2 more answers
_______ allow(s) you to apply colorful, eye catching designs to a presentation all at once.
astraxan [27]

What are some options of answers, or is there none?


4 0
3 years ago
Read 2 more answers
Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure mali
Andrei [34K]

Answer: The goals of computer security are to protect computers and users from data theft or loss as well as damage to any part of the computer.

Explanation: Common means of achieving computer security are firewalls, anti-virus software and this can fail due to hardware problems  or   weaknesses that prevent malicious attacks.

To answer this question, think of a time when you experienced any one of these. For example, personally, I was once an unfortunate victim of a general malicious attack that took advantage of a weakness in my anti-virus software. After clicking on a link on a dodgy website, a virus was installed on my computer. My computer finally crashed, without any hope of restarting it. I lost all my data and I had to buy a new computer.  This was a malicious attack.

However, sometimes people can be specifically targeted to steal their data or monitor their activities.  

8 0
3 years ago
A __________ constant is a name that references a value that cannot be changed while the program runs.
asambeis [7]

Answer:

Explanation:

A constant is a name that references a value that cannot be changed while the program runs

Example in Javascript:

const x = 5;

cannot be reassign x

wronged: x = 10; (will throw an error try to assign value to constant variable)

7 0
2 years ago
(in order of a-z)
Lerok [7]

Answer:

Airplane

Balloons

Bookmark

Boot

Chips

Cup

Dog

Flowers

Glove

Hat

Lamp

Notebook

Orange

Pen

Poster

Scissors

Snake

Telephone

Turtle

6 0
2 years ago
Other questions:
  • What exactly is a byte? A byte is a term that is short for binary digit. 8 bytes hold about one letter, one number, or one speci
    10·1 answer
  • Controller Area Network CAN B bus diagnostics is being discussed. Technician A says some modules do not set specific codes that
    13·1 answer
  • What was one complication caused by the tsunami that struck japan in 2011?
    15·1 answer
  • Whats the answer to this question?
    7·1 answer
  • In a typical e-mail address, the "host" is user: which one of the following word processing features saves you the most time whe
    8·1 answer
  • What behaviors are most common in a successful entrepreneurship
    9·1 answer
  • In C, how could I use a command line input to remove certain characters from an existing string? For example, if I have string '
    8·1 answer
  • mta software development fundamentals You are creating an application that accepts input and displays a response to the user. Yo
    10·1 answer
  • List three differences between word and excel
    8·1 answer
  • An optical fibre has an attenuation of 0.3 dB/km. If a laser launches an optical power level of PIN (mW) into 35 km length of th
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!