1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ddd [48]
2 years ago
14

The technology behind the Internet and E-mail dates back as far as 1969. What two software innovations helped the Internet becom

e user-friendly to the average computer user?
Computers and Technology
1 answer:
Alla [95]2 years ago
7 0
DOS and Windows, DOS was a generation before windows came out. (Not certain, you might want to research it a little)
You might be interested in
The flagging of an uncommon last name as a spelling error can be stopped by opening the shortcut menu on the first occurrence of
Mice21 [21]

Solution:

The flagging of an uncommon last name as a spelling error can be stopped by opening the shortcut menu on the first occurrence of the name and selecting of ignoring all.

Thus the required right answer is B.

8 0
3 years ago
How do you create a algorithm?
aksik [14]
Make sure that each box has an arrow going to it or leading from it, if it needs one. Select “Insert,” then “Shapes,” and choose the Text Box option: Page 2 [Algorithm how-to procedure] 2 Drag the cursor across the document to customize the size of the text box. Click inside the box to begin typing.
brainliest pls
6 0
2 years ago
Read 2 more answers
Gaven's instructor told him to include a personal statement in his work portfolio. Why did his instructor recommend including a
KatRina [158]
The recommendation of the instructor for Gaven to include a personal statement in his work portfolio will allow him to identify his career goals. If he is unable to show this to his work portfolio then he may simply state it in the personal statement. Thus, the answer to this item is letter A. 
6 0
2 years ago
Social engineering attacks can be carried out:______.
Alik [6]
The answer most likely B NOT SURE )
3 0
2 years ago
Rita used information from a blog that someone else wrote. What should she do?
Shkiper50 [21]

Answer:

rita should either ask the original author for permission to use her blog, but the best answer woyuld be that she should site her sources.

Explanation:

7 0
2 years ago
Other questions:
  • Danny is editing the text content of a single page on a website he created a year ago. What part of the tag would he have to upd
    11·1 answer
  • It takes you 0.8 of a minute to read each page of your health book. It takes you 5.5 minutes to take the test at the end. How lo
    10·2 answers
  • True or false: when considering data backups, it is most important to verify that the integrity of the backup file or data is va
    9·1 answer
  • 12. Noodle Tools is a website that
    8·1 answer
  • Digital certificates can be used for each of these EXCEPT _____. A. to encrypt channels to provide secure communication between
    13·1 answer
  • Which renewable resources are available at any time?​
    15·1 answer
  • Write a for loop that computes the following sum: 5+10+15+20+...+485+490+495+500. The sum should be placed in a variable sum tha
    7·1 answer
  • Bob has 2 candy bars he is fat what hapennes
    5·2 answers
  • Give three general reasons for the importance of computer networking.
    9·1 answer
  • Jjhb ft fv tuning Denise l Debbie
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!