1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimulka [17.4K]
3 years ago
8

Which type of network is the internet? choose the answer

Computers and Technology
1 answer:
Alex Ar [27]3 years ago
5 0

Answer:

WAN or wide area network

Explanation:

The Internet is the most basic example of a WAN. It is connecting all computers together around the world.

You might be interested in
Help<br><br> My internet won't work on my other pc i tried a lot to get it back
sladkih [1.3K]

Have you tried restarting your internet yet? I'm not very skilled with stuff like this, but my dad sometimes does that if nothing else is working.

Hope you can figure it out!

7 0
3 years ago
Read 2 more answers
A technician is troubleshooting a printer connected to a computer via USB. The printer will print using the controls at the prin
ki77a [65]

Verify the USB cable is attached

Answer: Option A.

<u>Explanation:</u>

The USB cable utilized for printers is known as a USB AB cable, named for the attachments on each end. The USB-An end is a level, rectangular fitting; the USB-B end is a square attachment with two bended edges, which goes into the printer.

A USB link associates your printer to your PC, so you have an immediate association each time you print. Most of printers are good with a USB 2.0 A/B link. This is a standard link that is generally accessible and it can likewise be utilized to interface a few mice and cameras to your PC as well.

7 0
3 years ago
Which type of vulnerability scan mimics the work of a threat actor who has already exploited a vulnerability and compromised cre
Vilka [71]

There are different type of vulnerability scan. The type of vulnerability scan mimics the work of a threat actor is called Credential Vulnerability Scan.

Credential Vulnerability Scan is known to be a scan in which there is a valid authentication of credentials Example are usernames and passwords etc. are known to be supplied to the vulnerability scanner to mimic the work of a threat actor that has these credentials.

They are known to be very slow but can give an in-depth insight into the system by accessing a wide range of the installed software  

Learn more from

brainly.com/question/14728460

5 0
3 years ago
If\s*.*[&gt;&lt;]=.*\s*:<br> what does this mean
trasher [3.6K]

You know that means if you use c++

you need to put something in this

#include<iostream>

using namespace std;

int what_ you_ want;

int main ()

{

cout<<"WHAT DO U WANT"; cin>>what_you_want;

if (what_you_want<1000)

and then use {, else, } return 0;

but it is good for c++


5 0
3 years ago
Write an algorithm to get the value of length and breadth of a rectangle from the user and find its area. inn qbasic
Shalnov [3]

Answer:

IN PYTHON ::

x=int(input('Enter length:'))

y=int(input('Enter width:'))

print('Area of the rectangle is', x*y,'squared units')

I hope it will be useful.

5 0
3 years ago
Other questions:
  • What are Three types of informational references
    9·2 answers
  • Worms often try to disguise from where they are sending data by using a bogus ip addresses instead of using an authorized ip add
    11·1 answer
  • How many water bottles must be collected to win?
    8·2 answers
  • A binary gap within a positive integer N is any maximal sequence of consecutive zeros that is surrounded by ones at both ends in
    13·1 answer
  • Complete this code in main to perform the requested operations for a date entered by the user in this format: month dd, yyyy
    10·1 answer
  • Define and discuss statistical significance as it pertains to web analytics, formulate your own opinions of what this means. in
    8·1 answer
  • The Presonus Studio Live 24 console has analog D-sub direct outputs. What cable would you need to connect this to a HD Analog in
    15·2 answers
  • Which of the following is not a Nintendo game character?
    6·2 answers
  • Explain the applications software that you use everyday
    5·1 answer
  • Consider the following class interfaces:
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!