1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Evgen [1.6K]
3 years ago
14

Two of the people most often credited with the invention of the Internet and WWW respectively are _____.

Computers and Technology
1 answer:
krek1111 [17]3 years ago
7 0
Bob Kahn and Vint Cerf were both pioneers of the Internet, and Tim Berners-Lee was known for inventing the WWW.
You might be interested in
During the _____ of the systems development life cycle (SDLC), an information system is operating, enhancements and modification
Neporo4naja [7]

Answer:

Maintenance Phase

Explanation:

One of the concepts employed in project management for describing stages involved when carrying out an information system development project is the systems development life cycle (SLDC). The cycle which starts from carrying out a feasibility study and ends in maintenance is a highly used conceptual model. There are 5 major stages or phase and they are the; Requirement Phase, Design Phase; Implementation Phase, Test Phase, and the Maintenance phase. The maintenance phase comes when testing has been complete and all enhancement and modifications have already been developed, and the system is operating.

5 0
3 years ago
Which activity represents a violation of the licensing agreement
kvasek [131]
Could you give the answers it gives you? It should be along the lines of purposeful destruction of equipment.
5 0
4 years ago
Read 2 more answers
"You are on a service call to fix a customer’s printer when she asks you to install a software package. The software is on a per
pickupchik [31]

Answer:

Ask her to get a genuine software

Explanation:

if i will install, it can cause the following problems:

1. Prated software makes your system Vulnerable to the security attacks because the activities of the software are not monitored by any organization and no one is responsible for anything bad happened to your system.

2. It may stop working anytime because there would not be maintenance patches available for it so that it can work properly.

3. It cannot be updated and may cause problems in core functionalities of it.

4.Serious legal actions can be taken against anyone using them because  economy has drastic decrease due ti use of it.

7 0
3 years ago
in a particular factory, a team leader is an hourly paid production worker who leads a small team. in addition to hourly pay, te
malfutka [58]

Facilitate team development for successful project completion. Through coaching and mentoring, provide teammates with technical leadership.

Establishing best practices and habits will help the team maintain high standards for the quality of its software. Identify and promote the team's potential development and improvement areas.

#include<iostream>

using namespace std;

/*C++ Function to print leaders in an array */

void printLeaders(int arr[], int size)

{

  for (int i = 0; i < size; i++)

   {

       int j;

       for (j = i+1; j < size; j++)

       {

           if (arr[i] <=arr[j])

               break;

       }  

       if (j == size) // the loop didn't break

           cout << arr[i] << " ";

 }

}

/* Driver program to test above function */

int main()

{

   int arr[] = {16, 17, 4, 3, 5, 2};

   int n = sizeof(arr)/sizeof(arr[0]);

   printLeaders(arr, n);

   return 0;

}

Learn more about Development here-

brainly.com/question/28011228

#SPJ4

7 0
1 year ago
7. Suppose that a RISC machine uses 5 register windows. a. How deep can the procedure calls go before registers must be saved in
Semenov [28]

Answer:

bbbbbbbbbbbbnbbnnnnnnnnnnnnnnnnn

6 0
2 years ago
Other questions:
  • Ted wants to follow the StartSafe philosophy when working around electricity. Which of the following steps would be consistent w
    15·2 answers
  • The faster the clock speed, the more of these the processor can execute per second. what are they?
    15·2 answers
  • What specific authentication method has no encryption for user credentials or data, and is not recommended for most applications
    14·1 answer
  • One advantage of using personal computers for Internet access is that they have relatively large screens for viewing Internet co
    7·2 answers
  • What is the main component of the EV3 Lego Robot called?​
    6·1 answer
  • Some applications required advanced storage solutions are available to provide fault tolerance and high performance.
    13·1 answer
  • TOT al<br>Name TWO examples of these settings and utilities. (2)​
    12·1 answer
  • What form of contacts can be shared in Outlook 2016?
    9·2 answers
  • Five plus six is equal to?​
    10·2 answers
  • Complete the function favoriteFlower(). Note that the program will not run as is because the function is incomplete. The purpose
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!