1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OverLord2011 [107]
2 years ago
7

How is internet connection made possible.​

Computers and Technology
1 answer:
julsineya [31]2 years ago
6 0

Answer:

To connect to the Internet and other computers on a network, a computer must have a NIC (network interface card) installed. A network cable plugged into the NIC on one end and plugged into a cable modem, DSL modem, router, or switch can allow a computer to access the Internet and connect to other computers.

You might be interested in
This is Very very Important to me[BRAINLIEST)✅​
sineoko [7]

Answer:

Rom

mellisa

Explanation:

pls mark me BRAINLIAST

4 0
2 years ago
A tablet computer is a low-cost, centrally managed computer with no internal or external attached drives for data storage.
Norma-Jean [14]

Answer: False

Explanation: Tablet computer is a type of the smartphone which is portable and has computer functions. It can be used for the data accessing, videos, pictures etc. They also have a internal storage for the storing of the data.So, the statement given is false.

Thin client is the device that persist these features mentioned in the question.It is a small computer without fan and any hard-drive for the storage.It is device that has a connection along with a network,.

5 0
2 years ago
Question 5 of 10
Drupady [299]
The programs you need for you are not even done yet
3 0
1 year ago
What engine component is shown in the above Figure?
astra-53 [7]

send attached file with it


5 0
3 years ago
Read 2 more answers
Legal counsel has notified the information security manager of a legal matter that will require the preservation of electronic r
Ray Of Light [21]

Answer: (B) Legal hold

Explanation:

As being a security director, the security director are approached to solidify a server that run the red hat enterprise server the 5.5.

The servers are being utilized as DNS (Dynamic host service) and the server time. This is not utilized as the database, print server and the web server. There is no particular remote associations with the server.

The window of the command will be given the root accessing. Then, it provide the associated by means of a protected shell with the access root in the system.

 

3 0
3 years ago
Other questions:
  • If I put a short clip from a copyrighted video to Facebook and make it only viewable to friends, is that illegal?
    12·1 answer
  • A(n) _____ allows a user to choose specific files to back up, regardless of whether or not the files have been changed.
    9·1 answer
  • Are the actions legal or illegal?
    13·1 answer
  • What are the differences between a trap (aka software interrupt) and an interrupt (hardware interrupt)? What is the use of each
    12·1 answer
  • Woah my favorite character got arrested
    10·2 answers
  • 1. Se requiere implementar un conversor unipolar que tendrá una tensión analógica variable entre 0 y 2 V pico. Deberá tener una
    10·1 answer
  • Generally speaking, problems are rarely caused by motherboards. However, there are some instances in which a motherboard can fai
    12·1 answer
  • 20 points for ez question lol
    9·2 answers
  • A computer program that enables users to create and work with files and folders is called what?
    8·2 answers
  • KELLY Connect
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!