1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wel
4 years ago
15

The device that links computers via communication lines is called the:

Computers and Technology
1 answer:
m_a_m_a [10]4 years ago
7 0
The device is ; a modem.
Hope this helps

You might be interested in
Haya would like to complemely delete Slide 11 from her presentation so that slides 12–16 become slides 11-15. What is
MArishka [77]

Answer:

replace everything on 11 to 12

Explanation:

6 0
3 years ago
From the introductory conversation chip and anna shared, which elements mentioned might suggest the use of case tools?
kari74 [83]

CASE tools are used to boost analyst output, enhance user-analyst collaboration, and incorporate life cycle tasks.

Chip and Anna would communicate with one another and discuss parts of the design that they have finished using CASE tools.

Due to the enormous number of users in a system, CASE tools will help to simplify communication among all users and analysts, therefore this would be helpful to Chip and Anna as well.

They could also employ CASE tools to help them record the data they have obtained from questionnaires, interviews, and document analysis.

Learn more about tool:

brainly.com/question/25860017

#SPJ4

8 0
1 year ago
Which server-based authentication protocol would be best for an organization that wants to apply authorization policies on a per
BARSIC [14]

Answer:

TACACS+

Explanation:

TACACS+ or terminal access controller access-control system plus is an open standard protocol developed by Cisco. It encrypts all communication in a network ( including the password and data sent) and supports a separate authentication, authorisation and accounting policies for access to a centralised database.

It also uses the transport layer protocol TCP for a reliable data communication.

6 0
4 years ago
Examples of domain names and usernames<br><br><br><br>​
svp [43]

Answer:

examples are:

com or .edu is a top-level domain name (TLD)

cornell.edu is a second-level domain name (SLD)

bigred.cornell.edu is a third-level or three-part domain name

project.bigred.cornell.edu is a fourth-level or four-part domain name

hope this helps you.

4 0
3 years ago
Whats with the bot spamming customer care numbers...kinda annoying when im trying to help people.
Norma-Jean [14]

Answer:

yes

Explanation:

5 0
3 years ago
Other questions:
  • Complete each statement by choosing the correct answer from the drop-down menu.
    10·1 answer
  • Objectivity is only a small part of assessing a Web site. <br> a. True<br> b. False
    10·1 answer
  • Binary data is written in hexadecimal. For example, when creating a graphic for a website, colors are represented by six hexadec
    12·1 answer
  • C++
    8·1 answer
  • When someone registers a domain name that is a company's trademark, hoping to resell it to the company at an exorbitant profit,
    14·2 answers
  • Omar is preparing to deliver a presentation to his class. It is about a program to collect samples from an asteroid that has bee
    13·1 answer
  • The online underground is used _____. Select 3 options. by law-abiding citizens only on Black Friday for networking by criminal
    11·1 answer
  • Pls help due tonight<br>Will give brainiest
    13·2 answers
  • Match each role to the corresponding web development task.
    14·1 answer
  • D&gt; Windows is the most popular for ​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!