1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Law Incorporation [45]
3 years ago
12

Uses of internet write in point.​

Computers and Technology
1 answer:
Vladimir [108]3 years ago
3 0

Answer:

-Electronic mail. At least 85% of the inhabitants of cyberspace send and receive e-mail. ...

-Research.

-Downloading files.

-Discussion groups. ...

-Interactive games. ...

-Education and self-improvement. ...

-Friendship and dating. ...

-Electronic newspapers and magazines.

You might be interested in
Each entry in a linked list is called a_______
Elena-2011 [213]

Answer:

The Answer is <u>c. Node</u>

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

Entries in a linked list are called or known as a <u>"node"</u>. Nodes are each element within the linked list. They are called nodes because are are illustrated as interconnected boxes that depend on other elements in the set.

Link are pointers that direct you to another element when called upon, and Data Structures are the way in which a set or information is organized. Therefore none of these could have been the answer.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

7 0
3 years ago
What is the command to create a compressed archive(archive1.tar.gz) of files test1 test2and test3.
yulyashka [42]

Answer:

The command to create a compressed archive (archive1.tar.gz) is

tar\,\,-czvf\,\,archive1.tar.gz\,\,test1\,\,test2\,\,test3

Explanation:

The explanation for the above command is

The general command to create a compressed archive is

tar -czvf name-of-archive.tar.gz /path/to/directory-or-files

Here, the terms are as follows:

-c : Creates an archive

-z : Compress the archive with gzip.

-v : This is known as verbose. This is an optional command and it displays the progress on terminal command. Without this the progress is not displayed on terminal command.

-f : Allows to specify the file name of the archive.

Here, if we want to archive multiple files, we provide the command the names of multiple files or directories of the files also can be used.

So, the command tar\,\,-czvf\,\,archive1.tar.gz\,\,test1\,\,test2\,\,test3

creates a compressed archive  - archive1.tar.gz of files test1, test2 and test3.

 

7 0
3 years ago
What is the difference between player-centric game design and designer-centric game design? How does a player-centric game assis
RoseWind [281]

<u>Answer</u>:

<em>A player centric game would be one of the best game where the player would navigate till the end of the game. </em>

<u>Explanation</u>:

It is the game, where the designer considered himself as <em>a player and make the background picture, music, character, challenge </em>everything would be tackled in a fun-filled way.

A <em>designer centric game would be a one, where the player wouldn’t enjoy playing and will never be able to complete the entire game</em> and would have been tired of listening to the background music and other <em>unfriendly aspects in the game.</em>

8 0
3 years ago
In needs analysis: Group of answer choices the costs of different physical network design alternatives are assessed the rate of
Ludmilka [50]

Answer:

the goal is to understand what users and applications the network will support.

Explanation:

A traditional network design approach is said to follow the structured systems of analysis as well design process that is similar to that which is used in building such applications. The main goal of the application developers is understand and study the needs of the users and also the application which the network will support.

5 0
3 years ago
Which access object(s may be used when creating a lookup field to select valu?
BabaBlast [244]
What the heck is your username?
8 0
3 years ago
Other questions:
  • what is a massive online storage that allows for access by any Internet connected device running a web browser and is used for l
    7·1 answer
  • _______ refers to the poitically, religiously, or ideologically motivated use of computers (or related technology) by an individ
    15·1 answer
  • A style manual can be described as
    11·2 answers
  • What is wrong with my code?
    7·1 answer
  • Write a program to read 10 integers from an input file and output the average, minimum, and maximum of those numbers to an outpu
    14·1 answer
  • Generally speaking, problems are rarely caused by motherboards. However, there are some instances in which a motherboard can fai
    12·1 answer
  • Help me please I’m failing
    11·1 answer
  • (a) What is the meaning of word 'computer (b) Cive a reason for the evolution of computer (c) Write a weakness of a computer (d)
    14·1 answer
  • Where to get industrial circuits far cry 6
    8·1 answer
  • Each of the flowchart segments in Figure 3-24 is unstructured. Redraw each segment so that it does the same processes under the
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!