1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirill115 [55]
4 years ago
10

Why do we use modem whileaccessing the internet or email​

Computers and Technology
1 answer:
Dafna1 [17]4 years ago
7 0

Answer: Modems: Your gateway to the internet

To bring the internet into your home, you're going to need a modem. This is a small device that connects to your internet service provider (ISP) to tap into all that internet goodness. ... Your modem shares this connection with a computer or a router via an Ethernet cable.

Explanation:

You might be interested in
Which is a benefit of a stock photo agency?
Burka [1]

A stock photography agency is essentially a middleman between you as a photographer and the licensors of your work. Typically, the agency takes a commission from each sale. For photographers, working with a stock agency can help get your work in front of new audiences, expanding your profile and opening new revenue streams.

4 0
3 years ago
Read 2 more answers
When a new user visits your proprietary site, what is typically the first method of interaction with them
Olin [163]

Answer:

Log file entry notifying you of new user activity

Explanation:

Log files are records of the timeline of activities in a computer system. These files contain information about new users of a site as well as the activities they performed on the site.

The internet protocol address of the visitor, the time of visit, as well as the features clicked on, or accessed by him, example, videos or images are all registered in the log file. The owner of the site can use the information sourced from the log files to perform site analytics.

5 0
3 years ago
Which would take more storage space, a layer file showing all the us counties or a layer file showing all the us states?
Ksju [112]
All counties. Much more info. Although most layers are just excel files with geographical reference data in them. That one file may be several MB as the state file may be 1mb or less
5 0
3 years ago
The Scrum team is Using Kanban board to make work Visibility available to all. What cannot visible? a) percentage Completion b)
Crank

Answer:

a) percentage Completion

Explanation:

A Kanban board is a digital panel divided into five columns where work teams can view a job until its execution and thus optimize the flow of completed jobs, in addition to allowing the full execution of tasks. These columns are named refers to each phase of the production of a job, as a phase is completed it is possible to move the job to the next column, which allows us to conclude that the use of this type of frame allows the movement of tasks from right to left, but does not allow you to see the percentage of completion.

8 0
3 years ago
When you create a new slide in a presentation program, you are promoted to choose a placeholder. True or false?
andrey2020 [161]
If you so choose, you can pick a layout for your slide, this comes up as a prompt, not a promotion.

I think false.
3 0
4 years ago
Read 2 more answers
Other questions:
  • Given two integer variables matricAge and gradAge, write a statement that gives gradAge a value that is 4 more than the value of
    9·1 answer
  • ​_____ refers to​ internet-based platforms that allow users to create their own content and share it with others who access thes
    6·1 answer
  • The IBM 370 mainframe computer was introduced in 1970. The 370 Model 145 could hold up to 524,288 bytes of data (512 Kbytes). It
    8·1 answer
  • ____ allows you to control how objects enter, move on and exit slides
    13·1 answer
  • ___ consists of a central conductor surrounded by a shield (usually a wire braid).
    9·1 answer
  • Which OS does NOT provide users with a GUI?
    5·1 answer
  • In the following code, use a lock to protect any data that might need protecting. Keep your critical sections as small as possib
    8·1 answer
  • Anyone know how to do point hack​
    9·2 answers
  • Which of the following algorithms is the same as the flowchart shown below?
    9·1 answer
  • Which of these expressions is used to check whether number is equal to value?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!