1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex787 [66]
3 years ago
7

What do you think is the most fascinating aspect of the internet?

Computers and Technology
2 answers:
klio [65]3 years ago
7 0
That you can look out anything you need.
horrorfan [7]3 years ago
5 0
In my opinion one of the most fascinating aspects of the internet is its interactivity. Other media have pre-scheduled programmes, while in the internet user can always choose what he wants to watch/listen/play etc. It also works instantly, we usually don't have to wait for results of the interaction, so that's another positive.
You might be interested in
What are the advantages to using a linked implementation as opposed to an array implementation?
aalyn [17]

Answer:

 The main advantage of using the linked implementation over the array implementation are:

  • In linked list, the size of list does not need to be mention initially in the program in dynamic memory deallocation and allocation.
  • We can easily add new elements and nodes in the linked list as there is no size limit.
  • We can easily insert and also remove the elements and nodes in the linked list without re-organize the complete structure. As, the information do not need to be stored in the memory. On the other hand, array implementation takes maximum time as compared to linked list.  

5 0
3 years ago
What device brocasts all data packets to other nodes on a network?
katovenus [111]
Switch/Router is Broadcast 
8 0
3 years ago
Discussion Six: Code of Ethics IT workers have many different relationships, including those with employers, clients, suppliers,
tia_tia [17]

An ethical issue that IT organizations face today is that of being able to illegally download software or files that should not be legally available, or that should not be downloaded for free. This poses an ethical problem, as dowloading these items illegally would greatly benefit the IT company economically. However, the company is required to ignore the availability of such material and instead abide by the law.

An example of this in my personal life is that of dowloading illegal music. As I am aware of the fact that dowloading music for free from illegal sites is against the law, I have taken the responsibility of not doing it. However, this requires me to control or moderate my behaviour, as I know that I have the skills and the financial incentive to act in this way. I have to remember that, although I have the skills to do so, I do not have the right to abuse the systems or the data that I have access to.

5 0
3 years ago
. One of the vulnerabilities the Morris worm used was a networking service called finger. The purpose of the finger service is t
Komok [63]

Answer: C)report the status of individual computer users

Explanation:Morris worm is known as the program that replicates itself automatically and hides in the computer system.Because of the vulnerability of the system ,the worm worked as finger protocol for the gaining of the user information and status.

Other option are incorrect as the they are not the vulnerability factor for the Morris worm to work on it and thus finger protocols don't work on those option.Thus, the correct answer is option(c)

3 0
3 years ago
2. Kabel yang digunakan pada jangan wireline, sebagai
Mumz [18]
It’s b ........................................
7 0
3 years ago
Other questions:
  • Identify the six components of an information system. Which are most directly affected by the study of computer security? Which
    8·1 answer
  • The amount of data is increasing exponentially over time. true or false.
    6·1 answer
  • The "network of networks," consisting of LANs (Local Area Networksnetworks connecting two or more computers, usually within the
    5·1 answer
  • What laptops can you get for 2500$ and should mostly using Microsoft applications.
    14·2 answers
  • identify at least three additional ethical responsibilities expected from a computer professional. In brief, explain each respon
    11·1 answer
  • Micheal is the project manager in a company. He wants his organization to use technology for higher revenue and productivity. Wh
    13·1 answer
  • Is it okay for potential employers to search your social media for use in determining if you are a fit for the position?
    15·1 answer
  • How Powerpoint is useful in education aspect?
    5·2 answers
  • When you use the predict step in the IPDE process you
    8·1 answer
  • Greg is concerned about the use of ddos attack tools against his organization, so he purchased a mitigation service from his isp
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!