1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dem82 [27]
3 years ago
9

What is a type of local network that people can use to access the Internet?

Computers and Technology
2 answers:
RideAnS [48]3 years ago
8 0
Router: it can host the local network at home (via wifi) and through NAT (network area translation), route local traffic to internet traffic
ExtremeBDS [4]3 years ago
4 0

Id say Router is the answer based on your Question.

Router - is a device used to host a network signal which people will require the SSID(network-name) to connect to.

It is a bit confusing because the correct answer is SSID  which leads me to belive Public Wi-Fi is also correct..

You might be interested in
____ storage is not recommended for long-term archiving because the storage media can degrade over time
Lunna [17]

Hard Drive is not recommended for long-term archiving because the storage media can degrade over time,

<h3>What type of storage is recommended for long term data retention?</h3>

The long method used to long-term retention is the use of cloud. Cloud-based are known to be a form of cold storage that is made up of intelligent storage software.

Note that Hard Drive is not a long term kind of storage in the above context and as such, PE storage is not recommended for long-term archiving because the storage media can degrade over time,

Learn more about storage from

brainly.com/question/1317328

#SPJ1

5 0
2 years ago
In symmetric key cryptosystem, assume that Alice and Bob have set up a common key Kab. This key is only known to Alice and Bob.
azamat

Answer:

yes

Explanation:

If it is guranteed the key is only known to Alice and Bob and there is no risk of man in the middle attack or channel spoofing so we can achieve data origin authentication

4 0
3 years ago
All animations on the world wide web are flash animations
natima [27]

Not every animation on the web is Flash but currently the majority is. There exists simple GIF based animations as well as other technologies for animation such as Silverlight and HTML5. Most believe HTML5 will eventually replace Flash.

6 0
3 years ago
Read 2 more answers
Security and protection as it relates to operating systems is grouped into four categories: Availability, Data integrity, Authen
Ivahew [28]

Answer:

The answer is "Confidentiality".

Explanation:

Data Security is also known as protection against unauthorized computer access, files, and pages through digital information protection. The protection of data also prevents data from bribery.  

  • It applies to both the security of data from unwanted entities being obtained.
  • It allows accessing sensitive data, which may be able to do so.
4 0
3 years ago
Which tab and group will allow the insertion of rows and columns in a worksheet?
ivanzaharov [21]
Home tab, cells group
5 0
3 years ago
Read 2 more answers
Other questions:
  • Jackson is teaching the decimal number system. He wants his students to know how to expand numbers by powers of 10. Which is the
    13·2 answers
  • What does it mean to say that two variables are negatively correlated?
    6·1 answer
  • Technologies designed to replace operating systems and services when they fail are called what?
    15·1 answer
  • Where can you place CSS statements in an HTML file?
    7·1 answer
  • Technician A says that PTC heaters can be built into a conventional heater core assembly. Technician B says that a PTC heater's
    11·1 answer
  • You are creating a presentation and you have come to the last slide. You still have more information to add. What should you do?
    7·1 answer
  • 3.17 (LAB) Ch 5 Warm up: Drawing a right triangle (Python 3) This program will output a right triangle based on user specified h
    10·1 answer
  • Which of the following translates packets so that the node can understand them once they enter through a port?
    5·2 answers
  • Please help I’m not trying to fail
    7·2 answers
  • NAT addresses concerns over the dwindling IPv4 address space by ___________________. 1 point allowing networks to use fewer IP a
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!