1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lianna [129]
3 years ago
12

How did the internet originate??​

Computers and Technology
1 answer:
Aleks [24]3 years ago
4 0

Answer:choices

Explanation:

You might be interested in
In a network, a computer that performs specific services for other computers on the network is called a
klio [65]
Motherboard or main sequence processor 
(either that  a mainframe or a server)
hope this helps

8 0
4 years ago
Can someone give me the code for the edhesive 3.7 code practice for python? Thanks.
belka [17]

Answer:

Its me I think u might be able to know :)

Explanation:

4 0
3 years ago
By definition, a computer
lapo4ka [179]

Answer has a screen

Explanation:

a computer has a screen

5 0
3 years ago
Which is a disadvantage of pie charts?
anzhelika [568]
While the reader of a pie chart can clearly see which categories dominate, it can be difficult to see categories that occupy only a small percentage of the chart. This problem becomes worse if there are many small categories in the chart. Labeling the categories can also be difficult.
6 0
3 years ago
Programa que previene, detecta y elimina virus informáticos.
vesna_86 [32]

Answer:

Software antivirus

Explanation:

6 0
3 years ago
Other questions:
  • Which option organizes tasks based on importance?
    12·1 answer
  • 1. What is the main factor that affects Earth’s average temperature?
    12·1 answer
  • True / False<br> The exponent in floating point is stored as a biased value.
    9·1 answer
  • High capacity circuits are limited by the least capable network link, which is typically the user connection. As such, it is imp
    11·1 answer
  • HURRY!!!!!!!!!!!!!
    15·1 answer
  • A ____ is a key-dependent, one-way hash function that allows only specific recipients(symmetric key holders) to access the messa
    7·1 answer
  • Explain the<br>4 ways<br><br>ways of arranging icons.<br><br>​
    6·1 answer
  • Can Algorithms Be Used Again?
    8·1 answer
  • What is the answer for 2.8.10 word games? This is what I have so far, but I can’t seem to be able to figure out the bananaSplit
    6·1 answer
  • Rohan is creating a presentation with at least 50 slides. He wants the slides to use a consistent layout and formatting. Which o
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!