1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svp [43]
2 years ago
13

Choose the answer.

Computers and Technology
2 answers:
kobusy [5.1K]2 years ago
5 0
Router is the answer
Alik [6]2 years ago
3 0
A home network aswell business networking would use a Router to connect the lam and internet all together
You might be interested in
When methods have ____, other programs and methods may use the methods to get access to the private data.
Nostrana [21]

When methods have public access, other programs and methods may use the methods to get access to the private data.

<h3>What do you mean by public access?</h3>

The Definition of the term public access is known to be a kind of a television channel where anybody can be able to broadcast a program

An example is the city council meeting can be able to broadcast on public access.

Hence, When methods have public access, other programs and methods may use the methods to get access to the private data.

See full question below

When methods have ____, other programs and methods may use the methods to get access to the private data.

a. private access

b. public access

c. complete access

d. all access

Learn more about public access from

brainly.com/question/2736088

#SPJ1

5 0
2 years ago
Categorize the following relationships into generalization, aggregation, or association. Beware, there may be n-ary associations
Oksana_A [137]

Answer:

Answer explained below

Explanation:

a. A country has a capital city.------------ aggregation(city is part of country)

b. A dining philosopher uses a fork. ----------- association(philosopher and fork are different entities)

c. A file is an ordinary file or a directory file. ------- generalization( both ordinary and directory files are having attributes of files)

d. Files contain records.--------- aggregation( records are part of File)

e. A polygon is composed of an ordered set of points. ----------- aggregation( points are parts of polygon)

f. A drawing object is text, a geometrical object, or a group. --------- generalization( text and geometrical objects are drawing object)

g. A person uses a computer language on a project. -------- aggregation( person and computer language are part of project)

h. Modems and keyboards are input/output devices. -------- aggregation( Modems and keyboards both are I/O devices)

i. Classes may have several attributes.------- aggregation( attributes are part of classes)

j. A person plays for a team in a certain year. ----------- aggregation(player is part of team)

k. A route connects two cities. --------- aggregation( route consists of two cities)

l. A student takes a course from a professor. ----------- association( student and course are separate entities)

5 0
3 years ago
8) Which of the following statements is FALSE?
user100 [1]

Answer:

3) Academic journal articles are always unbiased in their analysis.

Explanation:

The Academic journals are not always unbiased. There can be some authors which may write in some situation and bias the articles. It is important to analyse source and reliability of the article before relying on it. An unbiased author will try to capture picture fairly. The unbiased author presents the facts as it is and does not manipulates the truth.

4 0
3 years ago
BADM-Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this cou
barxatty [35]

Answer:

WooW We Have To All This Which Class can you Please tell

5 0
3 years ago
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items effic
sashaice [31]

Answer:

the ergonomics To prevent a laptop from being stolen, you can use a surge protector. False; To prevent laptops from being stolen, you can use a cable lock. What is a digital certificate?

6 0
2 years ago
Other questions:
  • This common technique, employed at the edge of a network, eliminates the need for public IP addresses on a private network while
    8·1 answer
  • 4+4 act quick for brainliest
    10·2 answers
  • Which statement most aptly defines the term networking?
    8·1 answer
  • Katarina is deciding whether to buy a desktop or a laptop computer. What will most likely help Katarina make her decision?
    10·2 answers
  • What’s bigger 4,000,000 KB or 2.8 GB
    5·2 answers
  • 1.Input device which transfers information and images from physical documents to computer files.
    14·1 answer
  • A website's ____ page provides basic information about the individual or organization and includes a navigation bar with links t
    13·1 answer
  • Cryptcat is a Linux distribution that includes hundreds of security and hacking tools, including Nessus and Metasploit. It can p
    11·1 answer
  • . A wireless ……..is a device used to resolvewireless network connectivity problems.
    8·1 answer
  • Which type of computer is used microprocessor​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!