1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gayaneshka [121]
3 years ago
11

Type the correct answer in the box. Spell all words correctly.

Computers and Technology
1 answer:
mojhsa [17]3 years ago
4 0

Answer:

h

Explanation:

You might be interested in
The Early Days (Pre-Mechanical Period)​
Irina18 [472]

Answer:

The earliest age of technology. It can be defined as the time between 3000 B.C. and 1450 A.D. When humans first started communicating, they would try to use language to make simple pictures – petroglyphs to tell a story, map their terrain, or keep accounts such as how many animals one owned, etc.

<h2>Please mark me as brainliest</h2>

7 0
2 years ago
What subsection of the Internet requires specialized browser to access and is frequently used by cyber criminals and underground
kotykmax [81]

Answer:

c. Dark Web                                                

Explanation:

Surface web is also called visible web is a part of world wide web that can be easily searchable using search engines as its contents are indexed by the search engines such as Google and its contents are accessible by public using standard web browsers. So a is not a suitable choice.

Deep Web is called invisible web as it is not accessible or searchable to standard search engines like Google. Search engines cannot index the contents of these sites. However such sites do not requires specialized browsers to access. So b is not a suitable choice.

Dark Web: It is a part of Deep Web sites but it requires specialized software and browsers to access. These sites cannot be indexed and cannot be searchable through standard search engines. This is also called dark side of the world wide web darker which is frequently used by criminals, hackers, black markets, hit-men. Illegal activities on a massive level is takes place in the dark web such as access to stolen sensitive information, malware, drug trade and terrorist operations. These sites are temporary and keep changing addresses to lessen the risk of getting caught by govt agencies or security officials. So c is the suitable choice.

Crypto-Net is a kind of neural network which works with encrypted data which can make a prediction based on the data without disclosing the data and prediction to the 3rd party. So d is not a suitable option.

6 0
3 years ago
What is the use of html in websites
Alborosie
HTML is a very basic markup language and requires memorization of a few dozen HTML commands that structure the look and layout of a web page. Before writing <span>any HTML code or designing your first web page, you must decide on an HTML editor or text editor, such as Notepad or Word Pad.</span>
4 0
3 years ago
Read 2 more answers
Why is there no window on dishwsher
olchik [2.2K]

Because most people really don't want or need to see what's in there.

If you want to, open the door during the cycle. It won't harm anything.

If you're curious to see a dishwasher in action, some appliance showrooms have a display model, where the spray parts and the racks are in an entirely transparent box. They're to show how powerfully and completely the stuff inside will get cleaned, but you can also see how the dishwasher is intended to work, by filling with just a couple of inches of water, and then recirculating it for the duration of the cycle, to loosen the stuff on the dishes.

3 0
3 years ago
Read 2 more answers
ANSWER QUICKLY!
patriot [66]

Answer:

It is bit { measurement used to quantify computer data. }

7 0
3 years ago
Other questions:
  • What is the use of word art?
    10·1 answer
  • The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities.
    15·1 answer
  • Explain how to implement two stacks in one array A[1..n] in such a way that neither stack overflows unless the total number elem
    7·1 answer
  • Henry, a graphic artist, wants to create posters. Which software should Henry use for this purpose?
    13·1 answer
  • each term to the appropriate definition. DBMS data mining hash file index key field locking protocol relation roll back schema S
    14·1 answer
  • Name the functional arms of MSDE.
    13·1 answer
  • Definition of laptop
    12·2 answers
  • Explain any 10uses of computer that are specific to your field of study giving appropriate examples​
    13·1 answer
  • What is the base of a number system?
    8·1 answer
  • What is the name of the arm that is attached to the read/write head?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!