1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexandra [31]
3 years ago
6

Which device allows your computer to talk to other computers over a telephone line as well as access the internet?

Computers and Technology
1 answer:
Sphinxa [80]3 years ago
7 0

This question has 2 answers that I can see.

The first one would be a Dial Up Modem. These devices allow (or allowed, since they're pretty much obsolete) a computer to communicate over the phone lines and access the internet.

The second option for an answer would be a DSL Modem/Router. In a sense, a DSL (Standing for Digital Service Line) is a bit of a predecessor to traditional Dial Up, using a digital telephone line (However not the frequencies used for voice) to connect a computer or set of computers together and to the internet.

You might be interested in
If an item that is purchased is digital, this may involve a direct ______ of the item you purchased.
balu736 [363]

Answer:

contact?

Explanation:

it might be wrong, if it is, sorry! hope I could help:)

7 0
2 years ago
The flowchart shape for input or output is an oval. <br> a. True <br> b. False
Alisiya [41]
The answer is FALSE.Because an oval represents a start or end point.
A Parallelogram is the symbol that represents input/output
4 0
3 years ago
48. Which of the following can be used in the name of a variable?
aleksley [76]

Answer:

Alphabet and digits

Explanation:

A digit cannot be placed at the start of a variable name, but it can be used after the first character has been placed

6 0
3 years ago
If x=3.123, then int(x) will give ?
Lena [83]

Answer:

3

Explanation:

int(x)=3

int(x) rounds to the smallest whole number

For example,

if you say int(3.99) it is also 3

5 0
3 years ago
Which of the following is NOT a best practice to protect data on your mobile computing device?
OleMash [197]

<u>Lock your device screen when not in use and require a password to reactivate</u> is not a best practice to protect data on your mobile computing device.

<h3>What is a mobile computing device?</h3>

Any device that was built using mobile parts, such as mobile hardware and software, is referred to as a mobile computing device. Portable devices that can function like a typical computing device in terms of operation, execution, and provision of services and applications are known as mobile computing devices.

Portable and handheld computing devices are other names for mobile computing devices.

Modern handheld devices that have the hardware and software needed to run common desktop and Web applications are generally referred to as mobile computing devices. Similar hardware and software elements found in personal computers, such as processors, random memory and storage, Wi-Fi, and an operating system, are also found in mobile computing devices. They are made specifically for mobile architecture and portability, which sets them apart from PCS.

Learn more about mobile computing devices

brainly.com/question/8189998


#SPJ1

4 0
1 year ago
Other questions:
  • A virus that attaches to an executable program can do anything that the program is permitted to do.
    7·1 answer
  • 19. Squares. Write a program class named SquareDisplay that asks the user for a positive integer no greater than 15. The program
    11·1 answer
  • Nicole wants to create a database to collect information about videos in her video rental store. She would like to use the datab
    9·1 answer
  • After installation of SSL certificate website asking for username and password.
    6·1 answer
  • Write the definition of a function printLarger, which has two int parameters and returns nothing. The function prints the larger
    7·1 answer
  • Could u help me on this u just have to compare how its alike please help ​
    5·2 answers
  • Chelsea is writing a paper about the value of running every day. She wrote this thesis statement:
    10·1 answer
  • What percentage of teens say they have witnessed cyberbullying?
    6·2 answers
  • Copying materials from a source text without using is<br> considered plagiarism<br> ?
    5·1 answer
  • What is edge computing?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!