1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliya0001 [1]
3 years ago
14

What is he part of the computer that provides access to the Internet ?

Computers and Technology
1 answer:
andrew11 [14]3 years ago
8 0
The modem lets you access the internet. The modem connects to whatever you use for your service provider (including what you have chosen for your ISP, ie. cable, broadband, etc) which is how you're able to get online.
You might be interested in
What key do I use to start my presentation
Len [333]

Answer:

The answer to this question is given below in this explanation section.

Explanation:

Knowing how o start a presentation is crucial if you fail to capture the audience attention right of the bat your entire presentation will flop.Few listeners will stick with you to the end and retain what you have told.

That is mildly unpleasant when you are doing an in house presentation in front of your colleagues.But can become utterly embrassing when you are presenting in front of larger audience presentation to prospective customers.

Let you have most of your presentation slides and polished up you dont check and quick and effective power point presentation design tips.Many ideas are broken into bits sized statements for your slides and complemented with visuals.The best way is to appeal and invoke certain emotions with your audience curiosity,surprise fear or good old amusements.

8 0
3 years ago
10 disscused reasons why organisatoions use electronic spreedsheet​
alina1380 [7]

Well, In any accounting role, you can benefit from incorporating spreadsheets into everyday tasks, making your job streamlined and easier to manage. If you’re looking to progress onto AAT Level 3 Advanced Diploma, it’s good to see how spreadsheets can support you.

a) Easy payment tracking  - While small business owners and those new to accounting can find it difficult to track payments, spreadsheets offer a simple solution.  Spreadsheets are commonly used to analyse money that has been spent and income that has been received. They allow you to split the amount of money you have spent and received by time period and source. For example, you can separate out different types of expenditure such as rent or insurance, and track exactly how much can been spent on these in each month, by using a simple table.

8 0
3 years ago
How many binary digits are in 10^100.
Basile [38]

Answer:

333 binary digits.

Explanation:

8 0
2 years ago
Write a c program to count the total number of commented characters and words in a c file taking both types of c file comments (
Tanzania [10]

#include<stdio.h>

#include<stdlib.h>

int comment1(FILE *fp)

{

   char ch;

   int count=0;

   while(fscanf(fp,"%c",&ch)!=EOF)

   {

       if(ch=='\n')

       {

           return count;

       }

       count++;

   }

   return count;

}

int comment2(FILE *fp)

{

   char ch;

   int count=0;

   while(fscanf(fp,"%c",&ch)!=EOF)

   {

       if(ch=='*')

       {

           fscanf(fp,"%c",&ch);

           if(ch=='/')

           {

               return count;

           }

           count++;

       }

       count++;

   }

   return 0;

}

int main()

{

   printf("Enter the file name:");

   char s[1000],ch,ch1;

   scanf("%s",s);

   FILE*fp;

   fp = fopen(s,"r");

   int count=0;

   while(fscanf(fp,"%c",&ch)!=EOF)

   {

       if(ch=='\"')

       {

           while(fscanf(fp,"%c",&ch)!=EOF)

           {

               if(ch=='\"')

               {

                   break;

               }

               if(ch=='\\')

               {

                   fscanf(fp,"%c",&ch);

               }

           }

       }

       else if(ch=='/')

       {

           fscanf(fp,"%c",&ch);

           if(ch=='/')

           {

               count += comment1(fp);

           }

           else if(ch=='*')

           {

               count += comment2(fp);

           }

       }

   }

   printf("%d\n",count);

   return 0;    

}

3 0
3 years ago
Read 2 more answers
In a bluesnooping attack, the attacker copies emails, calendars, contact lists, cell phone pictures, or videos by connecting to
Kay [80]
The answer is depends. You can only get what the port lets you get. If the phone bans sending photos over Bluetooth than you can’t get the photos
3 0
3 years ago
Other questions:
  • When you ____ a method, you write multiple methods with a shared name but different parameter lists?
    10·1 answer
  • The best presentations try to include as much text as possible on each slide. True False
    6·2 answers
  • ) write a program that creates a vector of string called "vec". vector "vec" grows and shrinks as the user processes the transac
    6·1 answer
  • If a user has one column in a table and would like to make it into two columns which command should be used?
    8·2 answers
  • It's safe to download files from the internet if u perform regular Windows security updates, that is all u need to protect your
    10·2 answers
  • PLEASE HELP!!!
    12·1 answer
  • Two threads try to acquire the same resource at the same time and both are blocked. Then, they continually change their states i
    14·1 answer
  • What is the mest gun in pixel gun 3d imma give you brainliest
    14·2 answers
  • Which are guidlines for using themes? Check all that apply
    13·1 answer
  • Public class Dog
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!