1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alja [10]
3 years ago
15

________ was one of the first uses of the Internet

Computers and Technology
2 answers:
egoroff_w [7]3 years ago
7 0

Answer:

Tim Berners Lee

Explanation:

He is the person who invented internet

NeTakaya3 years ago
3 0

Government weapon in cold war

You might be interested in
How did New York Governor Hugh Carey handle Sostre’s situation?
Ira Lisetskai [31]

Answer:

The governor found a way to free Sostre without assessing whether or not he was guilty or innocent of drug crime in buffalo.

Explanation:

4 0
3 years ago
Read 2 more answers
8. Which of the following must a designer be aware of when planning the design of a document?
Hatshy [7]
8. The answer is C. intended audienceIntended audience refers is a group of people for whom the product/artwork is created. For example, if the intended audience is children, the design should be more simple and colorful
9. The ideal line length is B.  65–70This line is perfect for audience's vision so they could capture the whole artwork without missing any corners.
10. The answer is D.  reference book that guides the reader in applying accepted principles of usage in a specific field. In every style manual, we would see a set of standards/steps that must be followed for the project. The styles that are required will be really different depending on which publication organization you're working for.
3 0
3 years ago
What do “phone-copying” systems allow investigators to do?
Anastasy [175]

Answer:

it allows them to be able to look at the recent things people done on it . i believe

6 0
3 years ago
Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key
HACTEHA [7]

Answer:

No. This is not more secure.

Explanation:

this is not more secure than having all of Carol, bob and Alice having the same key.

alice would be able to know Carol's key for her to be able to verify the answer Carol gave to a challenge by her. she would also have to know bob's key to do the same.

any of these 3 would have to know someone else's secret key to verify answers to any challenge.

the challenge is to know the secret keys if the other two and if done, decryption can easily be done and they can impersonate.

8 0
3 years ago
What company or individual is responsible for developing the linux operating system?
Arisa [49]
The guy is Linus Torvalds.,
If this was helpful, please mark me as brainliest.
3 0
4 years ago
Other questions:
  • According to the article words have the power to change people's behavior. Describe one example of this from the article
    6·1 answer
  • Which keyboard feature is a form feed character?
    15·1 answer
  • Which PowerShell command will upgrade the VM configuration version to take advantage of the new features in Windows Server 2016?
    12·1 answer
  • A student has created a Book class. The class contains variables to represent the following.An int variable called pages to repr
    11·1 answer
  • Motorcyclist might make an adjustment in speed when encountering ?
    7·2 answers
  • The system requirements for software include the
    5·1 answer
  • g Statistics are often calculated with varying amounts of input data. Write a program that takes any number of non-negative inte
    12·1 answer
  • In what order does the Cascade look at factors to determine which CSS rule to follow?
    14·1 answer
  • HELP!!!!!
    15·1 answer
  • Define a SCHEME function, unzip, which takes a list of pairs ((a .b)... (an .bn)) and returns a pair consisting of the two lists
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!