1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jarptica [38.1K]
3 years ago
7

What is impact of Internet in our lives

Computers and Technology
1 answer:
NeTakaya3 years ago
7 0

Answer:

The Internet has changed business, education, government, healthcare, and even the ways in which we interact with our loved ones—it has become one of the key drivers of social evolution. The changes in social communication are of particular significance.

You might be interested in
If the computer you are using is a laptop that moves from one network to another, you can click the _____ tab and configure stat
Leni [432]
If the computer you are using is a laptop that moves from one network to another, you can click the Alternate Configuration tab and configure a static IP address setting for a second network.
4 0
3 years ago
Regulatory and informational markers are easily identified through which features
Darina [25.2K]
Regulatory or informational markers are utilized to inform you with respect to circumstances, threats, or headings. They may show reefs, swim territories, speed zones, and so forth. They can be effectively distinguished by the orange groups on the top and base of each float.
3 0
3 years ago
Which formula is properly constructed
kirill115 [55]

Answer:

Option 4 is correct ,=(B2+C9)

Explanation:

In excel a formula starts with an equal sign followed by the expression.

In first option the formula is incorrect inside the brackets. where 4 is equating to bracket. In 2nd option opening and closing brackets are not same. First closing bracket is missing an opening bracket. In third option all the formula is correct except the part where # is used in formula. Hash tags cannot be used in formula as a value. Here in option D  B2 and C9 are cell in excel, whereas parentheses are only used for better readability.

7 0
3 years ago
What was most monumental decision in making a trip to Oregon?
White raven [17]

Answer:

A. The amount of food to take on the journey

Explanation:

Hope you get it right!!

3 0
2 years ago
Read 2 more answers
The U.S. National Institute of Standards and Technology defines the incident response life cycle as having four main processes:
GuDViN [60]

Answer:

C. Post-incident activity.

Explanation:

An incident is a event of intrusion or attack or violation of an attempt of an attack. An incident response is an opposing response to an attack or violation.

An incident response life cycle are stages followed to mitigate a current attack or violation. The stages of the incident response life cycle are, preparation, detection and analysis, containing and eradicating and recovery, and post incident activity.

7 0
3 years ago
Other questions:
  • What is the difference between a fragment shader and vertex shader? How do they relate?
    8·1 answer
  • Ken is moving to a new city and considering whether he should rent or buy an apartment. what factors should he consider in his d
    5·1 answer
  • Which type of network topology has a central networking device which manages the network and acts as a communications conduit fo
    7·1 answer
  • 18) choose which article title would most likely be described by the database subject headings victims of famine, ireland, histo
    14·1 answer
  • A computer with a frequency 2 GHZ and its average cycle per instruction is 2. what is the MIPS of the computer?
    6·1 answer
  • Microcomputers, different from those giant mainframes and supercomputers, are designed for individuals. In fact, the microcomput
    7·1 answer
  • Which sentence is an example of an I-statement?
    6·1 answer
  • This method adds newValue to the list at the specified index. If the index is invalid for the list, throw an IndexOutOfBoundsExc
    13·1 answer
  • Consider our authentication protocol 4.0, in which Alice authenticates herself to Bob, which we saw works well (i.e., we found n
    15·1 answer
  • 15. You read a news article that's politically biased and not well organized. It's
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!