1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tia_tia [17]
3 years ago
13

A user logs on to a laptop and opens her email. What device will provide emails to the laptop?

Computers and Technology
1 answer:
Pavel [41]3 years ago
5 0

Answer:

a. Router

Explanation:

The device that provides emails to the laptop would be the Router. This device is basically the intermediary between your personal computer and the vast internet. It basically decides what information is safe enough to allow into your computer, as well as what the fastest path for the data to travel is. When emails are sent to your address the router allows you to access that information by connecting you to the correct pathways through the internet so that you can view those emails.

You might be interested in
Which U.S. government agency first funded the development of the Internet?
Doss [256]

Answer: ARPANET

Explanation: The first workable prototype of the Internet came in the late 1960s with the creation of ARPANET, or the Advanced Research Projects Agency Network. Originally funded by the U.S. Department of Defense, ARPANET used packet switching to allow multiple computers to communicate on a single network.

7 0
3 years ago
Read 2 more answers
What's good computing?
cestrela7 [59]

Answer:

1.Use passwords that can't be easily guessed, and protect your passwords.

2.Minimize storage of sensitive information.

3.Beware of scams.

4.Protect information when using the Internet and email.

5.Make sure your computer is protected with anti-virus and all necessary 6.security "patches" and updates.

7.Secure laptop computers and mobile devices at all times: Lock them up or carry them with you.

8.Shut down, lock, log off, or put your computer and other devices to sleep before leaving them unattended, and make sure they require a secure password to start up or wake-up.

9.Don't install or download unknown or unsolicited programs/apps.

Secure your area before leaving it unattended.

10.Make backup copies of files or data you are not willing to lose.

Explanation:

7 0
2 years ago
Directions: Asba student of Contact Center Service, you already have an experience using different computer programs. Try to rem
ELEN [110]

Explanation:

can u suggest a title about quarantine

ex: My quarantine life

8 0
3 years ago
Read 2 more answers
Ria has modified the hard disk that hosts the operating system by using the fdisk command. The fdisk command indicates that the
pickupchik [31]

Answer:

a and d

Explanation:

A. Run the parted command

D. Reboot the system

These two actions will make it easier to manually reload the fdisk

8 0
3 years ago
Explain the risks to privacy from collecting and storing personal data on computer systems and the programmer’s role to safeguar
Deffense [45]

Answer:

The risks is If your computer is stolen, someone  could get the data and If your laptop messes up you will you lose all the data.

Explanation:

7 0
3 years ago
Other questions:
  • Because we allow everyone full control, how do you make sure that the shared files are secure?
    8·1 answer
  • Consider sending a 10000-byte datagram into a link that has an MTU of 4468 bytes. Suppose the original datagram is stamped with
    10·1 answer
  • How do you enter the command prompt on Chromebook
    10·1 answer
  • Which type of loop is best if you do not know how many times you need the loop to run?
    8·1 answer
  • On five lane roadways, the center lane is designated for __________ and is used by vehicles traveling in both directions.A. Thro
    15·1 answer
  • Which of the following is true regarding a class and interface types? Group of answer choices You can convert from a class type
    9·1 answer
  • In a Java Script language. create a two-dimension array consisting of numbers representing costs. After creating the array, prin
    11·1 answer
  • What is functionality criteria or alternative word
    8·1 answer
  • Why does Brainly not have a astronomy section. (I'd prefer brainly answer this)
    7·1 answer
  • CS902 Module3 Homework1
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!