1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iren2701 [21]
3 years ago
15

Please please help me in my question please

Computers and Technology
2 answers:
NeTakaya3 years ago
3 0
The internet is a vast network that connects computers, cellular devices, and cable together from all over the world. There is wireless internet (Wi-Fi) which doesn’t use lines/cables to connect to devices. Cellular technology provides wireless internet access through cellphones. Finally there is satellite which travels an enormous distance from Earth to a satellite.
harina [27]3 years ago
3 0

Explanation:

The internet is a vast network that connects computer all over the world.

There are three types of internet:

  1. DSL(Digital subscriber line)
  2. cable broadband.
  3. Fiber optic broadband internet.
You might be interested in
When you cut and then paste a file, what are you doing?
frutty [35]

Answer:

removing it from it's current location and placing it in another

4 0
3 years ago
What is the most important concept in security and architecture design?
Alinara [238K]

Explanation:

The important concept of security architecture are as follows:

  • Relationships and Dependencies : It Signifies the relationship between the various components inside the IT architecture .
  • Form : It is associated with the IT architecture and can take a variety of forms .
  • Benefits : The advantages of the security architecture is the standardization, which makes it cheap and affordable , and can be re used .
  • Drivers: Security controls are determined by the following factors :
  • <u>Financial</u>
  • <u> Legal and regulatory</u>
  • <u>Risk management </u>
  • <u>Benchmarking and good practice </u>

7 0
3 years ago
2. You can ___ adjust to NOT sleeping at night.
zhannawk [14.2K]

Answer:

whats the answer chooses

Explanation:

7 0
3 years ago
Employees information system source code ..please ​
Alexxx [7]

Answer:

def greetuser(username)

6 0
3 years ago
Suppose that we have a ternaryrelationship R between entity sets A, B, and C such that (i) A has a key constraint; and (ii) Chas
lutik1710 [3]
Lol i mean it could definitely be any of the choices lol i don’t have a clue lol
3 0
3 years ago
Other questions:
  • Write a function which the counts the number of odd numbers and even numbers currently in the stack and prints the results.
    6·1 answer
  • Write a class named GasTank containing: An instance variable named amount of type double, initialized to 0. An instance variable
    13·1 answer
  • How to connect canon printer to computer?
    6·1 answer
  • Create a class called Book with the following properties using appropriate data types: Title, Author, numberOfPages, Create a se
    12·1 answer
  • Which option for creating a table involves the use of a grid of squares?
    10·2 answers
  • Indica si los elementos de las imagenes son una materia prima o un material elaborado
    12·1 answer
  • 3.29 LAB: Login name Write a program that creates a login name for a user, given the user's first name, last name, and a four-di
    10·1 answer
  • Which key serves as both toggle and manipulative key
    14·2 answers
  • when inserting a bibliography one choose from multiple ______ of bibliographies.[insert Bibliography]
    12·1 answer
  • Hiding/masking personal identifiers from a data set, so that the data set can never identify an individual, even if it is correl
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!