1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yulyashka [42]
2 years ago
12

Many large companies use the word(s), _____, to refer to the huge network of computers that meets their diverse computing needs.

Computers and Technology
1 answer:
yKpoI14uk [10]2 years ago
7 0
Many large companies use the word(s), _____, to refer to the huge network of computers that meets their diverse computing needs.

Answer: Enterprise computing

sorry if I’m wrong
You might be interested in
In animation what is exaggerated to make the characters more intensely what they are​
aleksklad [387]

Answer:

Exaggerated used of the technique can produce a comical effect, while more realistic animation must time the actions exactly to produce a convincing result. Slow in and slow out. Adds more frames near the beginning and near the end of a movement, and fewer in the middle, to make the animation appear more realistic.

5 0
3 years ago
How do I use this site?brainly.com
Zarrin [17]
You just answer other people’s questions you can also use this app to help you with your questions as well
5 0
3 years ago
Write a program that allow a customer to input the value of goods bought, The program should then decide the discount to give a
Thepotemich [5.8K]

Answer:

geeksforgeeks is the answer

5 0
2 years ago
The fiber-optic cables that span the globe over land and under sea make up the internet _____.
mestny [16]
Faster and cheaper!!!!!!!!!!!!!!!
5 0
3 years ago
Flash drives cds external disks are all examples of storage (memory) devices
abruzzese [7]
True; you can store anything up to operating systems on them. Come in handy when transferring data from computer to computer.
8 0
3 years ago
Other questions:
  • A document repository is down when you attempt to access it. which isa principle is being violated?
    13·1 answer
  • What are some of the challenges that could arise from setting up a file management system on a computer?
    11·1 answer
  • Question 4 (2 points)
    6·2 answers
  • What term is used to describe a function that uses an algorithm to convert an input of letters and numbers into an encrypted out
    9·1 answer
  • Write a method swaparrayends() that swaps the first and last elements of its array parameter. ex: sortarray = {10, 20, 30, 40} b
    15·1 answer
  • Instructions Write a program that asks the user for a number. If the number is between 1 and 255, the program outputs the corres
    15·1 answer
  • In chapter 11, we finally learn how the book got its title. What is the sign of the beaver? Is that what you expected when you r
    13·1 answer
  • Each object in your database application is shown in the
    12·1 answer
  • Ew<br>subject: Computer<br>11101÷101<br> binary operations<br>​
    7·1 answer
  • What are the odds that you find someone you know in person on here
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!