1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tensa zangetsu [6.8K]
3 years ago
14

What type of internet connection do you think you'd get in Antarctica?

Computers and Technology
2 answers:
sveticcg [70]3 years ago
5 0
I think it’s D not sure
rusak2 [61]3 years ago
3 0
Hello!
My best guess is you would have to use mediocre satellites that float over for internet connection.
You might be interested in
Write a program C statement to declare and initialize an array named afTest1 type float to store
Valentin [98]

Answer:

#include <stdio.h>

int main()

{

   float afTest1[5] = {90, 30, 25, 45, 55};

   for (int i = 0; i < 5; i++) {

       printf("%f ", afTest1[i]);

   }

   return 0;

}

Explanation:

Initialize the elements of the array as 90, 30, 25, 45, 55

Create a for loop that iterates through the array

Inside the loop, print each element using printf function

6 0
3 years ago
What is a sensitive compartmented information program
Dahasolnce [82]

Answer:

cpu

Explanation:

4 0
3 years ago
Where could an identity theft access your personal information
Nikolay [14]
Hello!

The identity theif could establish a new identity for ciminal purposes using YOUR identity and personal information, and the theif could aquire money or goods from it.

*PLAGIARISM FREE*
5 0
3 years ago
Read 2 more answers
You can send emails to individuals from your address book.<br><br> True<br> False
MAXImum [283]
I believe the answer is False or I may be wrong
5 0
4 years ago
At the Data Link Layer of the OSI Model, what type of address is used to identify the receiving host?
Natalka [10]

Answer:

Mac Address

Explanation:

The MAC address or Media Access Control  is a unique identifier that each manufacturer assigns to their devices that can connect to the network.  They consist of 48 bits in hexadecimal form, grouped into 12 pairs of characters and each character is formed by four binary numbers, generally separated by a colon. MAC addresses are used in the data link layer of the OSI model, specifically in the lower Medium Access Control layer. An example of a MAC address could be:

10: 68: c5: 5e: 27: 3f.

6 0
3 years ago
Other questions:
  • To select a number format, you can choose a category in the Number tab in the Format Cells dialog box and then select the number
    5·1 answer
  • Find the 65th percentile from the data. The data consist of class interval from 0-10, 10-20, 20-30, 30-40, 40-50, 50-60 and freq
    8·1 answer
  • A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The n
    8·1 answer
  • To save and store data separate from a computer, it helps to have an
    15·2 answers
  • jeff wants to create a website with interactive and dynamic content. Which programming language will he use?
    11·2 answers
  • Anybody know this question???
    6·1 answer
  • Hi guys, Im making a game. I want to make a collision event, but what is the code for making the wall and the box collide. I rea
    6·1 answer
  • k-means clustering cannot be used to perform hierarchical clustering as it requires k (number of clusters) as an input parameter
    15·1 answer
  • What feature is available to add a auggestion in the margin of someone else's document.
    11·1 answer
  • Explain the term creating in word processing​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!