answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DiKsa [7]
2 years ago
9

The Internet is BEST described as a vast _______ connection of computer networks that also link to smaller networks

Computers and Technology
1 answer:
storchak [24]2 years ago
4 0
Whats ur choices if there web or world try them

You might be interested in
Write a python 3 function named words_in_both that takes two strings as parameters and returns a set of only those words that ap
s344n2d4d5 [400]

Answer:

def words_in_both(a, b):

 a1 = set(a.lower().split())

 b1 = set(b.lower().split())

 return a1.intersection(b1)

common_words = words_in_both("She is a jack of all trades", 'Jack was tallest of all')

print(common_words)

Explanation:

Output:

{'all', 'of', 'jack'}

5 0
2 years ago
Read 2 more answers
You are a technical consultant for many businesses in your community. One of your clients, a small law firm, has a single Active
stellarik [79]

COMPLETE QUESTION:

You are a technical consultant for many businesses in your community. One of your clients, a small law firm, has a single Active Directory domain. They have two servers running Windows Server 2012 R2. Both servers are configured as domain controllers while also serving as file and printer servers.This client is calling you on a regular basis because users are deleting or damaging their files. You must visit the client's site and restore the files from backup. Your client has asked you to create an alternate solution. What should you do?

Answer:

Use the Windows VSS to create shadow copies on important data

Explanation:

Volume Snapshot Service (VSS) is a service available to Windows Operating Systems which allows safe backup of open files as well as locked ones. It does this by taking a snapshot the state of the drive, this snapshot information will be provided to the backup application whenever needed. It is important to mention that this service is only available on files which are in the NTFS format

8 0
2 years ago
Into which of these files would you paste copied information to create an integrated document?
Oksanka [162]
D cause you will need to keep up with data also
7 0
2 years ago
Read 2 more answers
A have a string, called "joshs_diary", that is huge (there was a lot of drama in middle school). But I don't want every one to k
Norma-Jean [14]

Answer:

C and G

Explanation:

In C language, the asterisks, ' * ', and the ampersand, ' & ', are used to create pointers and references to pointers respectively. The asterisks are used with unique identifiers to declare a pointer to a variable location in memory, while the ampersand is always placed before a variable name as an r_value to the pointer declared.

5 0
2 years ago
Simon finds a spelling mistake in his business document. One of his words has an extra "s" in it. He should _____. retype the en
sesenic [268]

The mistake is a minor error, so the best answer for this question would be:

C) Move the cursor just after the mistake and press backspace

Since it is a one-letter mistake, all Simon has to do is delete the one letter and he is good to go.

5 0
2 years ago
Read 2 more answers
Other questions:
  • Why is it important to back up data on a computer before you burn-in test the cpu?
    9·1 answer
  • Topological sort requires only a tiny addition to the DFS algorithms. Exactly one of the following data structures is required t
    9·1 answer
  • What company built its first computer from a wooden box
    12·2 answers
  • What are the arguments for writing efficient programs even though hardware is relatively inexpensive?
    10·1 answer
  • Interpretations of​ Moore's law assert​ that:
    13·1 answer
  • Which of the following best reflects why lighting systems are used when filming on location outdoors? (Select all that apply.)
    10·1 answer
  • The user interface contains two types of user input controls: TextInput, which accepts all characters and Numeric Input, which a
    11·1 answer
  • The properly marked source document states: (C) Operation Panda will take place on 29 September. The new document states: (C) On
    8·1 answer
  • Write an expression that continues to bid until the user enters 'n'.
    9·1 answer
  • 4.17 LAB: Data File A comma separated value (.csv) file has been included to be used for this program. Each line contains two va
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!