1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zaharov [31]
3 years ago
12

Around what time did the Internet come around and how did it all start? Would like to know more of the history of how the intern

et started - just a brief discussion will do.
Computers and Technology
1 answer:
Dafna1 [17]3 years ago
6 0

my momExplanation:my mom hhhhahhahahhaahhhahhahhahahah

You might be interested in
Most of the Desktop games contain a backdoor used to test and update the game.
sveta [45]

A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device (e.g. a home router), or its embodiment (e.g. part of a cryptosystem, algorithm, chipset, or even a "homunculus computer" —a tiny computer-within-a-computer such as that found in Intel's AMT technology).Backdoors are most often used for securing remote access to a computer, or obtaining access to plaintext in cryptographic systems. From there it may be used to gain access to privileged information like passwords, corrupt or delete data on hard drives, or transfer information within autoschediastic networks.

the answer is True

i hope it will help you

8 0
3 years ago
Jim, the IT director, is able to complete IT management task very well but is usually two weeks late in submitting results compa
oee [108]

Answer:Effective but not efficient

Explanation:

Jim is effective because he was able to complete the IT tasks well but he is not efficient because he didn't submit the result on time because being efficient includes management of time.

5 0
3 years ago
How does ur computer know that its cursor moved
Anton [14]
The sensor of a mouse connected to the computer or the touch pad being touched and swiped around on
8 0
3 years ago
Read 2 more answers
If a data label, title, or legend in a chart is difficult to read, you can format them as bold, but you cannot change the font s
Daniel [21]

If a data label, title, or legend in a chart is difficult to read, you can format them as bold, but you cannot change the font size: False.

<h3>What is a chart?</h3>

A chart can be defined as an effective medium that is used to graphically display data in a pictorial form. Thus, a chart comprises the following elements:

  • Data label
  • Title
  • Legend

If the aforementioned elements in a chart is difficult to read for the end users, they can easily format them as bold and equally change the font size.

In conclusion, the elements in a chart can be formatted as bold and their font size can also be changed.

Read more on chart here: brainly.com/question/24741444

8 0
2 years ago
Input _____ is a template or pattern that restricts data entry and prevents errors.
kolezko [41]
Input Mask

By providing input masks, you are able to help people enter data correctly for fields that contain data that is formatted in a particular way. Basically, input masks give you great control over what is entered. In simple terms, it restricts how one enters data into the database.



8 0
3 years ago
Other questions:
  • How could the provisions in the new health reform bill improve access to care?
    14·1 answer
  • Greg is the network administrator for a large stadium that hosts many events throughout the course of the year. They equip usher
    7·1 answer
  • Name the functional arms of MSDE.
    13·1 answer
  • Which of the following is considered a modern method of communication?
    7·2 answers
  • Why when you are on wifi it keeps kicking you off is your class during online learning​
    15·2 answers
  • Jenn wants to assign a value to the favorite car variable: favoriteCar = Toyota but gets an error message. What does she need to
    11·1 answer
  • Members of the sales team use laptops to connect to the company network. While traveling, they connect their laptops to the inte
    15·1 answer
  • Hey im b---o---r---e---d dont report cuz if u do ur l a m e :)
    14·1 answer
  • Combination of one or more columns used to identify particular rows in a relation is a (n)<br>​
    8·1 answer
  • Write the pseudocode for this flowchart
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!