1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonja [21]
3 years ago
9

When connecting to the internet, most internet users connect to a tier 1 network.​?

Computers and Technology
1 answer:
denis23 [38]3 years ago
8 0
False

Tier 1 ISPs exchanges traffic with other tier 1 internet traffic providers and are the backbone of the internet. They do not provide traffic to end users but provide internet to other ISPs. Tier 3 is the last mile provider who delivers internet access to homes and businesses.



You might be interested in
The scope of a variable declared outside of any function is:
Marta_Voda [28]

Answer:

a) Global

Explanation:

The scope of a variable declared outside of any function is Global.

Let us consider an example:

int g;

int  add(int a,int b){

   return a+b;

}

int  subtract(int a,int b){

   return a-b;

}

Here the variable g is defined outside any function and is accessible anywhere within the program. This is a global variable.

Variables defined within each function - a,b on the other hand have a local scope are are visible only within their respective function bodies.

5 0
3 years ago
Can someone please help with one? I will mark brainlest!!!
Snowcat [4.5K]

I want to say that it is data authenticity?

4 0
3 years ago
Read 2 more answers
Please list of 15 safety rules that you think should be practiced in the Computer Technology classroom/lab.
geniusboy [140]

Answer:

BE RESPECTFUL! Always treat the computer lab equipment AND your teacher and classmates the way that you would want your belongings and yourself to be treated.

No food or drinks near the computers. NO EXCEPTIONS.

Enter the computer lab quietly and work quietly. There are other groups and individuals who may be using the computer lab. Please be respectful.

Surf safely! Only visit assigned websites. Some web links can contain viruses or malware. Others may contain inapropriate content. If you are not certain that a website is SAFE, please ask a teacher or other adult.

Clean up your work area before you leave. All cords should be placed on the tables (not hanging off the sides). Headphones should be placed on the CPU/tower or monitor. Chair should be pushed under the tables. All trash, papers, and pencils should be picked up.

Do not change computer settings or backgrounds.

Ask permission before you print.

SAVE all unfinished work to a cloud drive or jump drive. Any work that is saved to the computer will be deleted when the computer is powered off or updated at the end of the day.

If you are the last class of the day, please POWER DOWN all computers and monitors.

Explanation:

tick me as brainlilist please

3 0
2 years ago
Write a bash script HW4p2.sh to print out the list of numbers between 0 to 100 (including 0 and 100) that are divisible by both
ratelena [41]

Answer:

#!/bin/bash

function number_div( ) {

   for i in {0. .100};

   do

   if (( $i % 3 == 0 ))

   then

   echo $i

   elif (( $i % 5 == 0 ))

   then

   echo $i

   else

   echo "Number not divisible by 3 and 5"

   fi;

   done

}

number_div( )

Explanation:

The bash script is saved as "HW4p2.sh" and executed as "./HW4p2.sh". This code would print all and only numbers divisible by 3 or 5.

8 0
3 years ago
Information security is defined as practice of preventing unauthorized access, use, disclosure, disruption, modification, or ___
Elena-2011 [213]

Answer:

destruction

Explanation:

destruction is also the property of information in which unintended users sabotage the information so that it becomes useless for both the owner and the user as well.

5 0
2 years ago
Other questions:
  • What is the Multiple Source Test
    15·2 answers
  • Erica has always selected large numbers of cells by clicking and dragging her mouse. A shortcut that she could use is to select
    6·1 answer
  • In which setting would you be least likely to find a full-time A/V technician?
    5·2 answers
  • A report formatted where the page is taller than it is wide is formatted in ____.
    12·1 answer
  • List 3 items that were on kens resume that should have been excluded
    13·2 answers
  • According to the Computing Research Association, the number of undergraduate degrees awarded in computer science at doctoral-gra
    11·1 answer
  • On the classic gameshow The Price Is Right, contestants must guess the price of an object (guesses are distinct). The winner is
    5·1 answer
  • Use the drop-down menus to match each description with the part of a report where it is located.
    10·1 answer
  • You are a network administrator for your company. The network consists of a single Active Directory domain. All servers run Wind
    7·1 answer
  • SOMEONE PLEASE HELP ME WITH THIS ILL GIVE YOU BRAINLY IF YOU GET IT RIGHT PLEASE!!!!!
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!