1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katarina [22]
2 years ago
15

Site at least 3 articles of impact of internet that affect in our daily lives.

Computers and Technology
1 answer:
GREYUIT [131]2 years ago
4 0

Answer:

Here are 5 ways IOT already affects our lives today.

Transportation. AT&T just added 2.1 million new wireless lines last quarter, but only about half of them were for people. ...

Health and Exercise. ...

Home. ...

Business. ...

Pollution and Waste Management.

Explanation:

You might be interested in
Which DHCPv4 message will a client send to accept an IPv4 address that is offered by a DHCP server? (Points : 5) Unicast DHCPACK
gogolik [260]

Answer: Broadcast DHCPREQUEST

Explanation:

The DHCPv4 broadcast the DHCP REQUEST message by the client for accepting an IPv4 address which is basically offer by the server.

The DHCP REQUEST indicate that type of server that are basically chosen by the client for further interaction.

The DHCPREQUEST message basically used to notify that the client decline or accept the offer of server. In the DHCP protocol, it basically allow for broadcasting the individual destination in the network. The server basically sent the DHCP OFFER for receiving the DHCP REQUEST.

 

4 0
3 years ago
An operating system coordinates the BLANK of a computers operation.
devlian [24]
I believe it is D. The Central Processing Unit (CPU) can manage memory and storage. It also makes sure every program has what it needs to keep it up and running. 
8 0
2 years ago
Read 2 more answers
What types of information are commonly included in headers and footers? Check all that apply.
polet [3.4K]
Date
Page number
File path and file name
3 0
3 years ago
There are six different sequences for the three approval tasks: check inventory; check credit; check special terms.
Lana71 [14]

Answer:

i dont know i am 13

Explanation:

3 0
3 years ago
A hacker using information gathered from sniffing network traffic uses your banking credentials from a recent transaction to cre
adell [148]

Answer: a replay attack, a replay attack is used so that the attacker can go sniff out the hash, and get whatever they are trying to get, then once it goes to the attacker it will go back to the original connection after replaying the hash

3 0
2 years ago
Other questions:
  • Jackie is planning a birthday party for her little brother and is researching different trampoline parks. She receives a pop-up
    12·2 answers
  • Write a program that allows the user to convert a temperature given in degrees from either Celsius to Fahrenheit or Fahrenheit t
    13·1 answer
  • You have a network of 300 users. You are finding that you must frequently restore files from backup that users have accidentally
    13·1 answer
  • How has technology influenced space exploration?
    13·1 answer
  • Google Slides saves your work to Google Drive. PowerPoint has the option to save to OneDrive. Both of these solutions are in the
    9·1 answer
  • A vertical curve means that any change in the Aggregate Price Level will have what result?
    15·1 answer
  • What is the definition of D1-D4?
    14·1 answer
  • How does the post process alert the user if it detects a hardware problem during the post process?
    6·1 answer
  • When an expression containing a ____ is part of an if statement, the assignment is illegal.
    14·2 answers
  • Design 3 classes: Computer - Superclass
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!