1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
juin [17]
3 years ago
7

What are the two most popular applications of theInternet?

Computers and Technology
1 answer:
fiasKO [112]3 years ago
8 0

Answer:

1) Electronic mailing

2) Web browsing

Explanation:

Electronic mail: For hundreds of millions of individuals, e-mail has become an significant component of private communications, many of whom have substituted it with letters or phone calls. E-mail has become an significant advertising medium in company, especially in cases where time-sensitive demand for products and services.Tickets for an upcoming sporting event, for instance, are sold by sending fans an e-mail message with ticket availability data and prices.

Web browsing: The web browsing is another critically important Internet application. The world of internet is filled with the immense of knowledge, subjects, and solutions. The user browse the internet to look out for the related queries, researches and lot other things.

You might be interested in
What are some of these new iPad extras? One is the iMarker. Crayola teamed up with another company to make it. It costs $29.99.
saul85 [17]
Another one is iMovie which allows you to edit and cut things.
5 0
3 years ago
What is a fax machine used for
pickupchik [31]

Answer:

A fax machine is used to send documents over a phone network.

Explanation:

The transmission that is sent is called "Faxes"

The easiest way to understand this is by having one person print a document at someone else's house. It is also a live time like a telephone, or like a text message.

4 0
3 years ago
For what show did the actor, whose star is located at 6667 Hollywood Boulevard, earn an Emmy Award for Outstanding Supporting Ac
Ilya [14]

The show’s title is China Beach, which was a television series set in a hospital during the Vietnam War. It was aired from 1988 to 2001. The actress who won a Primetime Emmy Award for Outstanding Supporting Actress in a Drama Series was Marg Helgenberger. She won in 1990 for her role as a part-time prostitute who is also a volunteer, Karen Charlene "K.C." Koloski.  


4 0
3 years ago
Read 2 more answers
What commands does SuperKarel know that regular Karel does not?
luda_lava [24]

Answer:

turnRight and turnaround

Explanation:

The regular karel does not know these commands

5 0
2 years ago
What is the difference between a network intrusion detection system (NIDS) and a network intrusion prevention system (NIPS)?
alisha [4.7K]

Answer:

Detection vs Prevention

Explanation:

  • A Network Intrusion Detection System as the name suggests it "detects" the attackers / vulnerabilities existed in the network system / infrastructure.
  • A Network Intrusion Prevention Detection System as the name suggests it "prevents" the attackers from hacking the system. While a detection just detects the abnormalities where as a prevention system can prevent them.
  • The detection system detects the vulnerabilities, security threats and the attackers in the system through the web traffic analyzers and security analyzers.
  • The prevention system prevents the network from being compromised. It tries to regain the access if already compromised.
  • Both the NIDS and NIPS have to be coordinated for the full protection of the network.
8 0
3 years ago
Other questions:
  • ​PeroxyChem's IT staff was able to free its IT staff to spend less time on routine maintenance and more time on strategic tasks
    11·1 answer
  • You need to access the registry on your windows 10 computer how do you do this
    9·1 answer
  • You can upgrade a cpu by adding registers and cache memory to it. <br> a. True <br> b. False
    7·1 answer
  • A group of students are collaborating on an online research project. What is an example of appropriate online behavior?
    10·2 answers
  • . Two blue armies are each poised on opposite hills preparing to attack a single red army in the valley. The red army can defeat
    5·1 answer
  • Waygate's residential Internet modem works well but is sensitive to power-line fluctuations. On average, this product hangs up a
    6·1 answer
  • The best way to help prevent a system from a worm attack is to use anti-virus software anti-malware software a firewall a router
    12·1 answer
  • Your team has provisioned an Auto Scaling Groups in a single Region. The Auto Scaling Group at max capacity would total 40 EC2 i
    14·1 answer
  • How do you put text in MS publisher?<br><br> When do you use text wrapping?
    14·1 answer
  • A time stamp indicates the date and time that a measurement was taken. A data scientist has a list containing 10,000 time stamps
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!