1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonja [21]
3 years ago
9

When connecting to the internet, most internet users connect to a tier 1 network.​?

Computers and Technology
1 answer:
denis23 [38]3 years ago
8 0
False

Tier 1 ISPs exchanges traffic with other tier 1 internet traffic providers and are the backbone of the internet. They do not provide traffic to end users but provide internet to other ISPs. Tier 3 is the last mile provider who delivers internet access to homes and businesses.



You might be interested in
Write a Python function to determine the volume of material remaining after the hole is drilled. The function should take as inp
Andru [333]

Answer:

height = int(input ("Enter height : ") )

print (height)

width = int( input("Enter length : ") )

print (width)

half_width =width/2

half_height=height/2

while 0==0:

   radius = float( input("Enter radius : ") )

   print (radius)

   

   if radius<half_width and radius <half_height:

       break

def remainingVolume(height,width,radius):

       

   vol_box=height*width*width

   print (vol_box)

   vol_hole=3.14178*radius*radius*height

   print (vol_hole)

   

   remaining_vol=vol_box-vol_hole

   print ("Remaining volume is ",remaining_vol)

   

remainingVolume(height,width,radius);

Explanation:

Take input from user for height ,width and radius. To find volume of box formula is vol=height* width*length\\

Let's assume width and length is same so

length= width

Using this formula of box volume find box volume.Now find volume of hole.

Consider hole as small cylinder, find volume of cylinder and subtract from volume of box to get remaining volume of box after hole.

vol_of_cyl=\pi radius^{2} height

5 0
3 years ago
Frequently used data is identified and read from the hard disk into memory, or _____, and is easily accessible when needed.
frutty [35]

Answer:

The answer would be disk cache.

7 0
3 years ago
How does an author use artifacts in literature?
cestrela7 [59]
They use artifacts in l<span>iterature in order to develop the plot and the characters.</span>
7 0
3 years ago
I have a problem with a task using scipy.optimize.minimize execution through the following methods: CG, BFG, Newton-CG, L-BFGS-B
Scilla [17]

Answer:

Touch and hold a clip to pin it. Unpinned clips will be deleted after 1 hour.

3 0
2 years ago
When a device is assigned a global unicast or link-local unicast address, it is recommended that ________________is performed on
olya-2409 [2.1K]

Answer:

DAD (Duplicate Address Detection) is performed on the address to ensure that it is unique.

Explanation:

4 0
3 years ago
Other questions:
  • Categories of general purpose application software and examples each​
    13·1 answer
  • The quality of a language that allows a programmer to express a computation clearly, correctly, concisely, and quickly is called
    7·1 answer
  • Universal Containers (UC) has decided to build a new, highly sensitive application on the Force platform. The security team at U
    11·1 answer
  • Briefly describe the client/server model.
    11·1 answer
  • Which of the following is NOT an example of written communication?
    8·1 answer
  • Consider the conditions and intentions behind the creation of the internet—that it was initially created as a tool for academics
    12·1 answer
  • Which headphones are a better option, the HyperX Cloud Stinger or the Logitech G432
    11·1 answer
  • Help!!!
    8·1 answer
  • Commercial technical data and commercial software:_________.
    11·1 answer
  • What is the full form of the OS?​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!