1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleonysh [2.5K]
3 years ago
11

Which service uses a broadband connection?

Computers and Technology
1 answer:
Sidana [21]3 years ago
5 0

Answer:

d

Explanation:

because all in one question form

You might be interested in
if the bandwidth-delay product of a channel is 500 Mbps and 1 bit takes 25 milliseconds to make the roundtrip, what is the bandw
Leona [35]

Answer:

2500 kb

Explanation:

Here, we are to calculate the bandwidth delay product

From the question, we are given that

band width = 500 Mbps

The bandwidth-delay product is = 500 x 10^6 x 25 x 10^-3

= 2500 Kbits

8 0
3 years ago
Gathering information with your eyes is called
Ivahew [28]
Observing, Looking, Collecting, there are a few words for "gathering information with your eyes". 
4 0
3 years ago
Read 2 more answers
What do you think is the most important factor affecting the collection of digital data and what impact do you think that this f
borishaifa [10]

<u>Answer:</u>

<u>Privacy concerns.</u>

<u>Explanation:</u>

Privacy concerns have played an important role in how we collect digital data. For example, privacy activists believe that an individual has the right to know how his or her information is being used and that such an individual also has the right to withhold such information.

Such issues have affected the ability of law enforcement agencies to investigate criminal activities. For example, an individual who is accused of a crime may claim a <em>right to withhold his personal information, such as his mobile device, and thus he refuses to give out such information.</em>

4 0
3 years ago
When creating a firewall exception, what is the difference between opening a port and allowing an application through?
Mnenie [13.5K]
Every application has access to specific opened port. If you only make a exception for the specific application only that application can bypass the firewall.
6 0
4 years ago
45 points pls help
Artemon [7]

Answer:

Repetition.

Explanation:

hope it helps u

can u mark me as brainliest

8 0
3 years ago
Read 2 more answers
Other questions:
  • Assume the following representation for a floating point number 1 sign bit, 4 bits exponent, 3 bits for the significand, and a b
    9·1 answer
  • Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other
    6·1 answer
  • 6 external parts of computer
    10·2 answers
  • The larger the Word Size of a computer
    6·1 answer
  • Intranets:
    8·1 answer
  • Select one or more of the following: Which of these events will cause signal(s) to be generated by the kernel (the operating sys
    6·1 answer
  • I love the brainly update guys! :)
    5·2 answers
  • The concept of "plug and play" is demonstrated by which of the following<br> scenarios?
    13·1 answer
  • How can your network be infected with malware or ransomware?
    6·1 answer
  • (Correct Answer Recieves Brainliest)
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!