1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saveliy_v [14]
3 years ago
11

What is an ISP? in computer Networking

Computers and Technology
2 answers:
miv72 [106K]3 years ago
8 0
An ISP is an internet service provider. They are the companies that are considered "last-mile" as they are the final point from all internet traffic being routed to your home. 
defon3 years ago
4 0
ISP is an abbreviation for internet service provider.
Hope this helps!
You might be interested in
Paul listed the websites he searched to find information on a career in biology ​
balandron [24]

Answer:

The frustration-aggression hypothesis

Explanation:

7 0
3 years ago
What the five types of initiatives that are necessary when putting together and implementing an IT strategy
STatiana [176]

Answer:

Pre-implementation

Planning

Execution

Completion

Control

Explanation:

The pre-implementation stage speaks volumes on the breakdown of the implementation stages and how it is being formulated. It shows a stepwise identification of important implementation carriers and the responsibility of the IT organization. Their focus is to determine the content and human resources that are required to implement the strategy being formulated.

The purpose of the planning implementation stage is to plan and agree on specific goals by considering all stakeholders. There is also a need to set deadlines, time-to-time evaluation, and effective coordination of the stakeholders.

The execution phase enforces the implementation plan. As the name implies, it builds a comprehensive plan by focusing on the target group to maintain and ensure a structural and systematically conducted work environment.

The completion phase includes all actions necessary to bring out the results within the organizzation. Initially, there is a need to agree on the dimension of the IT strategy, the time dimension, and the detailed dimension.

The last phase which is the control deals with the logic of setting appropriate quantitative and qualitative control measures so as to allows continuous implementation control and navigation implementation control.

7 0
3 years ago
A client has macular degeneration resulting in moderate visual impairment. The client works as a data entry clerk and wants to c
weqwewe [10]

Answer:

Low Vision Aid for Computer Users

Explanation:

Visually impaired people can use the same low vision aids for viewing a computer screen as they do for regular reading activities. These include eyeglass-mounted magnifiers, handheld magnifiers and stand-alone magnifiers.  But also, special software has been developed to display content on the screens of computers and other digital devices in large print. Other applications can read text and other visual content aloud with a synthetic voice.  These adaptive low vision devices let partially sighted people do the same computer-related tasks as fully sighted people — such as word processing, creating and using spreadsheets and viewing web pages online.

4 0
3 years ago
Write a statement that defines an ifstream object named inputFile and opens a file named "Friends.txt".
Simora [160]

Answer:

ifstream inputFile;

inputFile.open("Friends.txt");

Explanation:

Though, the programming language is not stated, questions like this are often from C++.

The first statement defines the ifstream object using the following syntax.

ifstream [object_name]

In this case, the object name is inputFile

So, the syntax becomes

ifstream inputFile;

The next line opens a file using the following syntax.

[object_name].open("Filename")

Here, object_name is inputFile and filename is Friends.txt

So, the open statement becomes

inputFile.open("Friends.txt")

5 0
3 years ago
PLZ HELP ASAP
fenix001 [56]

Answer:

Did this computer get a virus.

Explanation:

The brother can't change the password because it required him to get the old password before changing it.

4 0
3 years ago
Other questions:
  • The variable sentence stores a string. Write code to determine how many words in sentence start and end with the same letter, in
    13·1 answer
  • What type of window are you opening when you click the Start button on the Windows desktop, and then click the name of an app
    9·1 answer
  • Which of the following would be an example of a loss of record integrity in a
    12·1 answer
  • For activities with output like below, your output's whitespace (newlines or spaces) must match exactly. See this note. Jump to
    15·1 answer
  • What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d
    5·1 answer
  • A device which lets you interact with the computer
    6·2 answers
  • Write a JAVA program containing a method called hasEight(), which takes an int as input and returns true if the number contains
    14·1 answer
  • Jason has decided to use his name on all the images to protect them from misuse. He has also decided to use the logo of his comp
    15·2 answers
  • Select three advantages of cloud computing.
    10·1 answer
  • Question 1 of 10
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!