1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vesna_86 [32]
3 years ago
11

What was one of the first inventions that made it possible to communicate almost instantly?

Computers and Technology
1 answer:
Anastasy [175]3 years ago
7 0
You're answer is The Telegraph.
You might be interested in
What are the three fundamental principals of mnemonics? <br><br>HELP FASTTT!
muminat

Answer:

The three fundamental principles underlying the use of mnemonics are imagination, association, and location.

Explanation:

8 0
3 years ago
If someone has the IP address 127.0.0.1 and tries to connect to the address 127.255.252.255, which are they attempting to connec
sertanlavr [38]
B is the answer i think
6 0
3 years ago
How many possible mac addresses are there?
oksian1 [2.3K]
There are 6 octects ( 8 bit numbers ) in a MAC address, so there's 256^6 possible addresses.
6 0
3 years ago
Looking at the example below is the type value equal to a string or an integer?
Simora [160]
B. Integer I think that’s the answer
5 0
2 years ago
Read 2 more answers
Jed is the database administrator for a mid-sized computer component manufacturer. He is responsible for validating the data mod
svet-max [94.6K]

Answer:

Development task is the correct answer to the given question.

Explanation:

The database administrator is responsible for managing the database management system . The overall security of the database is depended on the database administrator.

The Development task include the following function  

  • Verification of the data model that is used by the database management system .
  • Check the user input it means validating the data.
  • Defining the overall requirement to create the model.
  • Providing backup when the data is loss .

So the Development task is the correct answer.

3 0
3 years ago
Other questions:
  • Write a function named delete Letter that has 2 parameters. The first parameter is a string, the second parameter is an integer.
    11·1 answer
  • Which of the following is not a general strategy for organizing and analyzing qualitative data?a.Convert the data into one or mo
    6·1 answer
  • Show a single view of an object, but show it in a way that makes it look 3-D, as your eye would see it.
    10·1 answer
  • Recall the insertion-sort-like algorithm in Problem 4 from Homework 2, where you know that certain pairs of contiguous items in
    15·1 answer
  • Write an if else statement that assigns 0 to the variable b and assigns 1 to the variable c if the variable a is less than 10. O
    5·1 answer
  • What is the importance of Mathematical Modeling in the field of bioinformatics.
    8·1 answer
  • Lisa managed incident response for a bank. The bank has a website that’s been attacked. The attacker utilized the login screen,
    9·1 answer
  • Assume that the variables v, w, x, y, and z are stored in memory locations 200, 201, 202, 203, and 204, respectively.
    6·1 answer
  • Help please!! worth 10 pts! answer quick please!
    12·1 answer
  • Name 4 components of a components system​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!