1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
earnstyle [38]
3 years ago
9

Tin học ra đời khi nào

Computers and Technology
1 answer:
zhenek [66]3 years ago
7 0

Answer:

The origins of science may be traced back to about 3000 to 1200 BCE in Ancient Egypt and Mesopotamia. Their contributions to mathematics, astronomy, and medicine influenced and developed classical Greek natural philosophy, which sought to offer formal explanations for phenomena in the physical world based on natural causes.

Following the collapse of the Western Roman Empire, understanding of Greek worldviews declined in Latin-speaking Western Europe throughout the early Middle Ages (400–1000 CE), but flourished in the Greek-speaking Eastern Roman (or Byzantine) Empire.

Explanation:

Nguồn gốc của khoa học có thể bắt nguồn từ khoảng 3000 đến 1200 trước Công nguyên ở Ai Cập cổ đại và Lưỡng Hà. Những đóng góp của họ cho toán học, thiên văn học và y học đã ảnh hưởng và phát triển triết học tự nhiên cổ điển của Hy Lạp, vốn tìm cách đưa ra những giải thích chính thức cho các hiện tượng trong thế giới vật chất dựa trên các nguyên nhân tự nhiên.

Sau sự sụp đổ của Đế chế Tây La Mã, sự hiểu biết về thế giới quan của người Hy Lạp đã giảm sút ở Tây Âu nói tiếng Latinh trong suốt đầu thời Trung cổ (400–1000 CN), nhưng lại phát triển mạnh mẽ ở Đế chế Đông La Mã (hoặc Byzantine) nói tiếng Hy Lạp.

(Hope this helps can I pls have brainlist (crown)☺️)

You might be interested in
Attackers need a certain amount of information before launching their attack. One common place to find information is to go thro
VARVARA [1.3K]

Answer:

The answer is Letter D. Dumpster diving.

Explanation:

This process of going through a target's trash is known in the community as dumpster diving. This attack is a technique used to retrieve information that could be used to carry out an attack on a computer network.

It is important to inform that the dumpster diving it is not limited to searching through  the trash for obvious treasures like acess codes or passwords written down on sticky notes.

8 0
2 years ago
The picture that graphically represents the items you use in Windows is called a/an
Fofino [41]
Icon need to use 20  characters <span />
7 0
3 years ago
If a database was being used to track sales, a customer who buys a lot of items would be a good example of how two tables could
3241004551 [841]

Answer:True

Explanation:

7 0
2 years ago
Who is the manager most likely to hire?
lakkis [162]
What is the question
7 0
3 years ago
Read 2 more answers
Darian has a gourmet cupcake business and needs a website to compete with the other bakeries in his area. He has a Google My Bus
Amiraneli [1.4K]

Answer:

The sequences are given below that is 3, 4, 5, 2, and 1.

Explanation:

The following steps are taken to develop the site via Google My Business.

  • In the first case, He signs his Google My Business.
  • In the second case, the site is accessed from the Home menu.
  • In the third case, the appropriate business details become modified.
  • In the fourth case, he attaches photos, like such a cover picture as well as a virtual guide.
  • In the fifth case, he selects the particular domains as well as directs this to the site.
7 0
3 years ago
Other questions:
  • Write a program that will ask the user to input a phrase (multiple word sentence), and an integer value. A static function will
    14·1 answer
  • Which of the following attacks seeks to introduce erroneous or malicious entries into a server's hostname-to-IP address cache or
    5·1 answer
  • What is the theory of trouble shooting
    10·2 answers
  • Of the various trends affecting the advertising and promotion industry, _____________ offers an opportunity for advertisers to d
    9·1 answer
  • Flash drive DVD and hard drive are all examples of
    6·2 answers
  • HELP PLEASE
    7·1 answer
  • What is the codebook?
    6·1 answer
  • Explain the different type of shift register counter ​
    14·1 answer
  • The photo shows a group of girls reacting to comments they have read about a classmate on a social media site.
    10·1 answer
  • How many dlcs in total were in each black ops game (including dlc weapons) answer for 25 whole points
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!