1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alina1380 [7]
3 years ago
9

Gabrielle would like to purchase a new ____, which would be used to connect the company’s lan and the internet.

Computers and Technology
1 answer:
IRINA_888 [86]3 years ago
4 0
It would be modem. The modem connects to the internet through their ISP's line via a (usually) coaxial cable. The modem then transfers information to a router, which is used to transfer the information coming from the internet to the rest of the devices on the network, wired, wireless, or both.

Nowadays, though, modems and routers tend to come in a two-in-one, whether it's first-party provided by your ISP, or third-party where you've purchased one. This two-in-one is often just referred to as the router, so this could well be the answer to your question as well.

The reason I stated the above answer, is because a regular router on its own is unable to connect to the internet, it must be receiving internet from somewhere. The two-in-one however would have the coaxial cable to connect to the internet, as well as your usual Ethernet ports and wireless capability.
You might be interested in
Which implementation uses both the legacy system and new system until all users verify that the new system functions correctly?
olasank [31]

Answer:

Explanation:

One group of students did an experiment to study the movement of ocean water. The steps of the experiment are listed below.

Fill a rectangular baking glass dish with water.

Place a plastic bag with ice in the water near the left edge of the dish.

Place a lighted lamp near the left edge of the dish so that its light falls directly on the plastic bag.

Put a few drops of ink in the water.

The student did not observe any circulation of ink in the water as expected because the experiment had a flaw. Which of these statements best describes the flaw in the experiment? (2 points)

Not enough ink was added.

Not enough water was taken.

The dish was too small for the experiment.

The lamp and the ice bag were at the same place.

3 0
3 years ago
Discuss whether design considerations need to change for each kind of computer users. support your answer with an example.
vaieri [72.5K]
Each kind of computer users have different knowledge, needs and requirements. For example there is a difference between the computer knowledge of developers and users without <span>technical experience. Because of this, but also why they need and use computers, and what tools they need, design consideration need to change for each kind of computer users.</span>
<span>
</span>
8 0
3 years ago
The _____ feature automatically corrects typing, spelling, capitalization, or grammar errors as you type them.
Snezhnost [94]
Autocorrect is the answer
6 0
3 years ago
Create and test an HTML document that describes nested ordered lists of cars. The outer list must have three entries: compact, m
melomori [17]

Answer:

Check the explanation

Explanation:

All website around the world/internet is a collection of different web pages, HTML can be referred to as the single most essential standard when it comes to web design, as well as it being the only one that’s enormously required or needed if you plan to create a web page.

to answer the question above, we will be creating an HTML document that describes nested ordered lists of cars, kindly check the attached images below to see the written codes to solve the question.

8 0
3 years ago
_________________ component defines the correct granularity for access controls and oversees the relationships between identitie
Otrada [13]

Answer:

<u>Authorization</u> component defines the correct granularity for access controls and oversees the relationships between identities, access control rights, and IT resource availability.

Explanation:

Access control is a security technique that verifies the permission that a person or device has to enter an area and to what extent. This function is within the identity and access management of a company. Authorization is the definition of what a specific user can do within an application, that is, to what information and operations they have access, in other words, it refers to the management of access to protected resources and the process of determining whether a user is authorized to access a particular resource. Authorization and access control are ways of enforcing access policies. Authorized persons may access certain resources for their job functions and identify and audit the accesses made.

8 0
2 years ago
Other questions:
  • What are smart mobile devices?
    6·2 answers
  • ________ and wpa are wireless security protocols which use encryption to secure wi_fi networks.
    12·1 answer
  • Which software application should be used to create a sales pitch to a group of people? Database Email Presentation Word process
    9·1 answer
  • If Number = 7, what will be displayed after code corresponding to the following pseudocode is run? (In the answer options, new l
    5·1 answer
  • Because Microsoft Access includes not only the software needed to create a database, but also the software needed to create form
    7·1 answer
  • Fuction table of JK-Flip flop?
    11·1 answer
  • Create a spreadsheet that lists the ten currencies you chose. For each currency, enter an amount and create a
    12·1 answer
  • An important communication principle states ""prepare before you communicate."" How should this preparation manifest itself in t
    10·1 answer
  • The response from a Google Form can be seen in how many ways?
    10·1 answer
  • PLEASE HELP WILL GIVE BRAINLIEST!!!’
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!