1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SIZIF [17.4K]
4 years ago
7

Which of the following activities have been made possible because of improvements in computer networks? Check all of the boxes t

hat apply.
A. using a computer keyboard
B. organizing the storage of data
C. calling on a telephone
D. accessing the Internet at the same time as other users
Computers and Technology
2 answers:
Artist 52 [7]4 years ago
7 0

Answer:

Option B is correct.

Explanation:

Earlier when the computer network didn't meet with the requirements, it was too difficult to store data safely and even to access the data, it required too much effort.

Now with the help of a well-designed computer network, we can keep the data with proper protection and we can easily access it whenever we need it.

With the Improvements in computer networks, We can create a huge data store and keep the different data in different parts which will be saved in the server and the benefit is that if data is crashed, we can easily retrieve it from the server.

ipn [44]4 years ago
7 0

Answer:

The Answer is :: organizing the storage of data

  accessing the Internet at the same time as other users

Explanation:

You might be interested in
One cost of starting your own business is _____.
Harman [31]
One cost of staring your own business is the loan payments on the small business loan.

Revenue is clearly not an issue, and escrow just straight up doesnt make sense.
So our answer is clearly the fact that you have to pay back the loan you took out originally for your business!
4 0
3 years ago
Which opera component is a solo performance
Arturiano [62]
 A solo piece written for a main character, which focuses on the character's emotion
4 0
3 years ago
Read 2 more answers
18. What do we call the Microsoft Word File?
Colt1911 [192]

Answer:

<h2>we call Microsoft Word File "<u>document</u>" or "<u>docx</u>"</h2>
5 0
2 years ago
1.1 what is the osi security architecture? 1.2 what is the difference between passive and active security threats? 1.3 list and
ioda

The well-designed standard architecture for security features in computer networking is defined by the OSI Security Architecture.

The OSI architecture is widely accepted because it establishes the process for ensuring safety in an organization. In a live attack, the victim is made aware of it. The victim of a passive attack is not made aware of the attack. System resources can be modified during an active attack. System resources are not changing while under passive attack. Monitoring a system is the focus of passive assaults, which do not require changing any data on the target system. On the system under attack, active threats will alter data.

Learn more about system here-

brainly.com/question/14253652

#SPJ4

6 0
1 year ago
How did people find the first ever piece of tech?
kirill115 [55]
It's not how the found it, it's how they made it.
3 0
4 years ago
Other questions:
  • In databases and database-related software, which choice is not a Boolean operator?
    7·2 answers
  • Which is the term for a computer typically located in an area with limited security and loaded with software and data files that
    9·1 answer
  • What is the full path of the directory on this computer containing the SAM registry hive file
    15·1 answer
  • (Please select 2)
    14·1 answer
  • How did AI help in creating the Cognitive dress for Marchesa?
    5·1 answer
  • If an individual column is listed in a SELECT clause, along with a group function, the column must also be included in a(n) ____
    12·1 answer
  • c++ Project 6: Buoyancy. Buoyancy is the ability of an object to float. Archimedes’ principle states that the buoyant force is e
    13·1 answer
  • Where is the best place to self learn c++ or c# that is free?
    6·2 answers
  • You can use _____ to track the state of each user in the application.
    8·1 answer
  • Anybody know the answer to this question?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!