1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margarita [4]
3 years ago
13

Packet switching was invented by: Apple DARPA Google Microsoft

Computers and Technology
1 answer:
riadik2000 [5.3K]3 years ago
8 0

Answer:  darpa

Explanation:

You might be interested in
An embedded system describes computing technology that has been enclosed in protective shielding for security reasons. True or f
ddd [48]

The statement 'an embedded system describes computing technology that has been enclosed in protective shielding for security reasons is false.

In the field of computers and technology, an embedded system can be described as a small computer, more overly an integrated chip, that is enclosed in an electronic device in order for making the device to run. The small computer integrated into the device helps in regulating the device. The purpose of an embedded system is not for protective shielding or security reasons hence the statement above is false.

In an embedded system, a combination of computer processor, computer memory, and input/output peripheral devices is present that performs a dedicated function. Microcontrollers are used for the management of an embedded system.

To learn more about embedded system, click here:

brainly.com/question/13014225

#SPJ4

7 0
2 years ago
Enterprise systems help managers and companies improve their performance by enabling them to __________.
Sonbull [250]

Answer: b)seamlessly share real-time data internally among departments and with external business partners.

Explanation: Enterprise system are type of software section that provides the facility of controlling and tracing of the operation in business organizations.They helps in making the business automatic, trading of data in different organization sectors internally and externally as well, reporting etc.

Other options are incorrect because it does not transfers the data using emails,outsourcing the process to vendors and combining data into central hub.Thus, the correct option is option (b).

4 0
3 years ago
Putting the word int into a code will create a string variable?
loris [4]

Answer:

Yes it will create a string variable

4 0
3 years ago
G The method of mapping where each memory locationis mapped to exactly one location in the cache is
Otrada [13]

Answer:

Direct Mapped Cache

Explanation:

Given that a Direct Mapped Cache is a form of mapping whereby each main memory address is mapped into precisely one cache block.

It is considered cheaper compared to the associative method of cache mapping, and it is faster when searching through it. This is because it utilizes a tag field only.

Hence, The method of mapping where each memory location is mapped to exactly one location in the cache is "Direct Mapped Cache"

4 0
3 years ago
While designing a website, a(n) ____ allows you to identify the specific amount of space used on a particular page before it con
Aleks [24]
The answer would be A: wireframe, im pretty sure...

Hope this helped!! :)

8 0
3 years ago
Read 2 more answers
Other questions:
  • A network using multiple cell towers falls under which type of network?
    13·1 answer
  • How do you ask brainy a question without it not liking the question and saying it hurts their feelings?
    14·1 answer
  • Help!!!! ASAP TIMED TEST 50 points!!!!
    7·1 answer
  • Each entry in a linked list is called a_______
    11·1 answer
  • The ____ developed numerical methods for generating square roots, multiplication tables, and trigonometric tables used by early
    12·1 answer
  • How do you create multiple columns in Word?
    12·1 answer
  • MR. Tom asked her students could they plant a flower and bring it to class. Sarah brought his flower and said it was a rose. Jam
    6·1 answer
  • Plsssssssss help me​
    8·1 answer
  • Classes that depend on field names from parent classes are said to be ____ because they are prone to errors.Group of answer choi
    14·1 answer
  • a network administrator for a large oil company has discovered that a host on the company network has been compromised by an att
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!