1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexandra [31]
3 years ago
6

Which device allows your computer to talk to other computers over a telephone line as well as access the internet?

Computers and Technology
1 answer:
Sphinxa [80]3 years ago
7 0

This question has 2 answers that I can see.

The first one would be a Dial Up Modem. These devices allow (or allowed, since they're pretty much obsolete) a computer to communicate over the phone lines and access the internet.

The second option for an answer would be a DSL Modem/Router. In a sense, a DSL (Standing for Digital Service Line) is a bit of a predecessor to traditional Dial Up, using a digital telephone line (However not the frequencies used for voice) to connect a computer or set of computers together and to the internet.

You might be interested in
The process of recognizing information? needs, using efficient search techniques to locate reliable sources of? information, and
RUDIKE [14]
What is being referred above is the digital information fluency. They are the ones responsible of producing an effective and efficient with the use of digital information.They also use it ethically which is beneficial to those who are using it. They are also used in evaluating and finding information in regards to digital information.
8 0
3 years ago
Write a program for any element in keysList with a value greater than 50, print the corresponding value in itemsList, followed b
Mamont248 [21]

Answer:

The solution code is written in Python:

  1. keysList = [32, 105, 101, 35]
  2. itemsList = [10, 20, 30, 40]
  3. output = ""
  4. for i in range(len(keysList)):
  5.    if(keysList[i] > 50):
  6.        output += str(itemsList[i]) + " "
  7.    
  8. print(output)

Explanation:

Firstly, let us use the two sample list, keysList and itemsList in our program (Line 1-2). Then create a output variable to hold the output string (Line 4).

Next, we create a for-loop and use it to traverse through the elements in the keysList. If any keysList element is bigger than 50 then we use the same index i to get the corresponding item from itemsList and join that value to the output string (Line 7-8).

Lastly, we print the output (Line 10).

4 0
3 years ago
Early in the history of technology, the development of tools and machines was based on _____ versus scientific knowledge as is d
Law Incorporation [45]

Answer:

Early in the history of technology, the development of tools and machines was based on technical know-how versus scientific knowledge as is done today.

Explanation:

In the era prior to technological development, men had a basic and at times rudimentary manufacturing development, based on artisan processes that developed their tools and machinery by hand, without any type of automation or mass production rules.

Thus, each part or tool was manufactured in a unique way, which required a broad mastery of the production process by the manufacturer. This is how the first professions began to emerge, such as blacksmiths for example, who mastered the technique of manufacturing different implements and carried them out without any scientific knowledge.

7 0
4 years ago
Consider an array of integers consisting of the numbers: 8 12 19 32 45 55 67 72 89 90 92. Suppose the binary search algorithm is
ankoles [38]

Answer:

Answered below

Explanation:

Index of the first element compared to the key is 5. The element itself is 55.

This index is evaluated by the addition of the index of the first element which is 0(zero) and the the index of the last element which is 10.

( Index of the last element is determined by subtracting the one from the total number of elements)

After the addition, the result is divided by 2 to get the first index from which the binary search begins.

firstIndex = 0

lastIndex = array.length - 1

midpoint = (firstIndex + lastIndex) / 2

6 0
3 years ago
Used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a se
Sati [7]

Answer: A- Public Key Encryption

Explanation: The Public key Encryption is used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private.

7 0
4 years ago
Read 2 more answers
Other questions:
  • Which is a form of malware? A. clickjacking B. spam C. cookies D. Trojan horse
    7·2 answers
  • Which of the following is where you can save, select a template, change document properties, and close or exit excel?
    8·1 answer
  • What are the details of frame transmission andreception that LAN interface handles?
    7·1 answer
  • How can you print a mailing label in word
    13·1 answer
  • 4. Write an appropriate comment for describ-
    11·1 answer
  • Computer design replaced ______________
    6·1 answer
  • What key do I use to start my presentation
    9·1 answer
  • Can we update App Store in any apple device. (because my device is kinda old and if want to download the recent apps it aint sho
    10·1 answer
  • Select all steps in the list below that should be completed when using the problem-solving process discussed in this chapter.
    14·1 answer
  • Parameters and return make
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!