1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alecsey [184]
3 years ago
9

Which part of the computer provides access to internet ?

Computers and Technology
2 answers:
Doss [256]3 years ago
8 0
The Modem is the correct answer
Xelga [282]3 years ago
4 0
The correct answer  is the modem
You might be interested in
A DTP setup includes many hardware and software components.
QveST [7]

Answer:

Apple Laser Writer is an example of a DTP <u>Hardware.</u>

Explanation:

DTP means Desktop Publishing. It may include the hardware and software. The DTP hardware includes two major parts a computer and a printer. The DTP software includes the software such as Photoshop, illustrator an other software that needs in desktop publishing.

Apple laser writer is a printer that is used to print the text and diagrams that we make using DTP software tools.

7 0
3 years ago
In this screenshot, the circled item is the
gavmur [86]

Answer:

Favorites tab/bar

Explanation:

6 0
3 years ago
Read 2 more answers
These factors influence the design of a network.
REY [17]
Availability ,devices and applications, performance, security, scalability.
8 0
3 years ago
Read 2 more answers
The audience, setting, and type of presentation help determine presentation content. True or False?
WARRIOR [948]

True. The audience is the key to the style of presentation and the content is led by the key to the topic. If the setting blends well with the audience age, gender, background, the presentation will be more effectively presented and positive, which will be more helpful to sell the audience to the point that is being made by the presenter.

6 0
3 years ago
Write a program that reads a string consisting of a positive integer or a positive decimal number and converts the number to the
jeka94

Answer:

#include <iostream>

#include <string>

#include <stack>

#include <math.h>

using namespace std;

int main() {

  string s;

  double n=0;

  int position=0;  

  stack<int> wholeNumbers;

  cout<<"Enter a decimal number:";

  cin>>s;

  string::iterator counter = s.begin();

  while(*counter!='.' && counter!=s.end()){

      wholeNumbers.push(*counter-48);

      counter++;

      position=position+1;

     

  }

  for(int i=0;i<position;i++){

      n=n+(wholeNumbers.top()*pow(10,i));

      wholeNumbers.pop();

  }

  position=-1;

  if(counter!=s.end()){

      counter++;

  }

  while(counter!=s.end()){

      n=n+((*counter-48)*pow(10,position));

      position=position-1;

      counter++;      

  }

  cout<<n;

}

Explanation:

  • Inside the while loop, push the push a number to the wholeNumbers stack by subtracting it with 48.
  • Increment the counter and position variable by 1 inside the while loop.
  • Count the number of digit, push each digit to top of stack and find the end of the number,
  • Run a for loop up to the value of position variable and pop a value from the wholeNumbers stack.
5 0
4 years ago
Other questions:
  • What is the difference between deta security and privecy ?
    12·2 answers
  • Which computer is the best for video cutting?
    11·2 answers
  • _________ are represented using diamonds linked withparticipant ETs
    6·1 answer
  • What are the advantages of using the internet as theinfrastructure for electronic commerce and electronicbusiness?
    6·1 answer
  • Input 10 integers and display the following:
    6·1 answer
  • After conducting interviews with several bad candidates, Althea, a manager at Langrover Inc. interviewed a candidate who was bet
    15·1 answer
  • Write an algorithm and flowchart to calculate sum of two given numbers​
    13·1 answer
  • What kind of energy transformation occurs when you call someone on a cell phone?
    11·1 answer
  • How can ICTs be used in the workplace to improve the way employees
    15·1 answer
  • A malicious actor is preparing a script to run with an excel spreadsheet as soon as the target opens the file. the script includ
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!