how is internet connection made possible.​

Answers

Answer 1

Answer:

To connect to the Internet and other computers on a network, a computer must have a NIC (network interface card) installed. A network cable plugged into the NIC on one end and plugged into a cable modem, DSL modem, router, or switch can allow a computer to access the Internet and connect to other computers.


Related Questions

What is a possible explanation for the issue described below? A user reports that ever since she or he began creating animations, graphics, and video clips for the company’s Web site on her or his computer, the computer has begun running slower, especially when performing the graphics functions. The computer needs an increase in VRAM. The computer needs an increase in SRAM. The computer needs an increase in SIMM. The computer needs an increase in RIMM.

Answers

VRAM because VRAM is used for graphic intensive workloads

Answer:

The computer needs an increase in VRAM

It is A

A logistics company's vulnerability scan identifies the following vulnerabilities on Internet-facing devices in
the DMZ: SQL injection on an infrequently used web server that provides files to vendors SSL/TLS not used for a website that contains promotional information
The scan also shows the following vulnerabilities on internal resources: Microsoft Office Remote Code Execution on test server for a human resources system
TLS downgrade vulnerability on a server in a development network In order of risk, which of the following should be patched FIRST?
A. Microsoft Office Remote Code Execution
B. SQL injection
C. SSL/TLS not used
D. TLS downgrade

Answers

Answer:

A. Microsoft Office Remote Code Execution

Explanation:

From the given options, we have;

The web server having a SQL injection is infrequently use

The information on the website having SSL/TLS not used is promotional

The location of the server having  a TLS downgrade is on a development network

The location of the Microsoft Office Remote Code Execution is on a human resource system test server

Therefore, given that the test server, is the deployment source of the main server, and that with a Remote Code Execution, RCE,  cyber attack, the attacker is able to make commands work on other computers, the RCE attack on the test server is a potential access of an attack on the main servers, and should be patched first.

Data stored on physical storage devices must do what before the processor can access it? Be converted to binary Be written to the hard drive Go into short-term memory Go from volatile to nonvolatile memory

Answers

Answer:

Go into short-term memory

Explanation:

Data stored on physical storage devices must go into short-term memory before the processor can access it.

This is because, physical storage devices are secondary memory which store information for a long time. The CPU does not work directly with secondary memory but with primary or short term memory. Since the CPU works mainly with short term memory, information in physical storage or secondary memory has to go into short term memory for the CPU to be able to process it.

So, data stored on physical storage devices must go into short-term memory before the processor can access it.

What is self management.​

Answers

Answer:

Self management is being able to control your emotion & behavior. This is a very important life skill

Explanation:

Self management is the ability to regulate own's emotions, thoughts, and behaviors effectively in different situations.

Which vendor owns the software platform Fusion?
A.
Microsoft
B.
Apple
C.
SAP
D.
Oracle

Answers

Answer: D

Explanation:

D. Oracle owns the software platform Fusion

Which SCSI standard allows for the technique known as “hot swapping”? Ultra SCSI Original SCSI Serial SCSI Fast-Wide SCSI

Answers

Answer:

Serial SCSI

Explanation:

Hot swapping can be defined as a process which typically involves fitting or replacing CD-ROM drive, hard-disk drive, power supply or other peripheral devices while a computer system is powered on. Thus, it allows for the installation or removal of a peripheral device from a computer while power is still being supplied to the computer i.e without having to shutdown the computer.

Serial SCSI is a SCSI standard which allows for the technique known as “hot swapping” because it's a point to point connection that is designed to move data to and from computer storage serially.

Abdullah wants to send sessitive data. Abdullah wants to make sure that only ahmed can see and read this. How can abdullah protect this data, so that ahmed can only access it. By using this information make an algorithm.

Answers

Answer:

Use an encryption algorithm

Explanation:

An encryption algorithm can be used to hide the message from parties in-between or any third parties that might want to intercept the message being sent by Abudullah to Ahmed.

Encryption algorithms use cryptographic methods to encrypt or code data such that only the sender and receiver of that data have the keys to properly decode/decrypt these messages/data.

Other Questions
Is velocity ratio of a machine affected by applying oil on it?Explain with reason. A coin is tossed and a die is rolled. Find the probability of getting a head and a number greater than 1.___.(Type an integer or a simplified fraction.) Help anyone can help me do this question,I will mark brainlest. Suppose that hiring a third worker at the campus coffee shop increases sales from $115 per hour to $130 per hour. What is the marginal product of labor per hour from adding that third worker After Rachel bought a magazine subscription, she does not enjoy the articles in the magazine. However, she dutifully reads the entire magazine every month because she had already paid for the subscription and feels the money will be wasted if she does not read it. What psychological factor associated with behavioral economics explains Rachel's behavior 1. What does the woman want to drink? (2 im)A. A bottle of water.B. A cup of teaC. A glass of fruit juice Memories of a MemoryHave you ever witnessed something amazing, shocking or surprising and found when describing the event that your story seems to change the more you tell it? Have you ever experienced a time when you couldn't really describe something you saw in a way that others could understand? If so, you may understand why some experts think eyewitness testimony is unreliable as evidence in scientific inquiries and trials. New insights into human memory suggest human memories are really a mixture of many non-factual things.First, memory is vague. Imagine your room at home or a classroom you see every day. Most likely, you could describe the room very generally. You could name the color of the walls, the floors, the decorations. But the image you describe will never be as specific or detailed as if you were looking at the actual room. Memory tends to save a blurry image of what we have seen rather than specific details. So when a witness tries to identify someone, her brain may recall that the person was tall, but not be able to say how tall when faced with several tall people. There are lots of different kinds of "tall."Second, memory uses general knowledge to fill in gaps. Our brains reconstruct events and scenes when we remember something. To do this, our brains use other memories and other stories when there are gaps. For example, one day at a library you go to quite frequently, you witness an argument between a library patron and one of the librarians. Later, when telling a friend about the event, your brain may remember a familiar librarian behind the desk rather than the actual participant simply because it is recreating a familiar scene. In effect, your brain is combining memories to help you tell the story.Third, your memory changes over time. It also changes the more you retell the story. Documented cases have shown eyewitnesses adding detail to testimony that could not have been known at the time of the event. Research has also shown that the more a witness's account is told, the less accurate it is. You may have noticed this yourself. The next time you are retelling a story, notice what you add, or what your brain wants to add, to the account. You may also notice that you drop certain details from previous tellings of the story.With individual memories all jumbled up with each other, it is hard to believe we ever know anything to be true. Did you really break your mother's favorite vase when you were three? Was that really your father throwing rocks into the river with you when you were seven? The human brain may be quite remarkable indeed. When it comes to memory, however, we may want to start carrying video cameras if we want to record the true picture.Which line from the text best explains why the author suggests we start carrying video cameras? You may understand why some experts think eyewitness testimony is unreliable The next time you are retelling a story, notice what you add With individual memories all jumbled up with each other The human brain may be quite remarkable indeed Factorise.. 25a sq. - 9b sq. please tell the answer For what purpose is the mineral corundum commonly used?O A. To make pencilsO B. To make false teethO C. To make emery boardsO D. To make drinking glasses HELP ASAPPP What is the y intercept of the graph that is shown below? (-3,4) (0,2) (2,0) (3,0) Suppose that you have generated the estimates listed below from a pro forma analysis for a company that had requested a three year loan. The loan is a $1.5 million term loan with the equal annual payments of principals. The P&I payments are due at the end of each year with the annual interest rate = Prime rate + 2%. Yr.1 Yr. 2 Yr. 3 Capital expenditure 250,000 125,000 75,000 Cash dividends 140,000 140,000 140,000 Cash flow from operations before interest expense 750,000 780,000 800,000 Assuming the Prime rate = 8% each year. What will be the interest payment at year 2? a. 25,000.b. 50,000.c. 100,000.d. 150,000.e. 200,000. What rhetorical device isevident in the followingpassage from Thomas Paine's"The Crisis, No.1"?Wars, without ceasing, willbreak out till that periodarrives, and the continentmust in the end beconqueror; for though theflame of liberty maysometimes cease to shine,the coal can never expire.A. repetitionB. parallelismC. emotional argumentD. establish a common ground The direction of applied force has to be .............. to the distance in order to say work is done (Economics)Which of the following best explains why the money supply is increased whenthe Fed buys Treasury bonds?A. When the Fed buys Treasury bonds, it increases the amount ofdeposits in people's bank accounts.O B. When the Fed buys Treasury bonds, the available supply of bondsdecreases, which drives up bond prices.C. When the Fed buys Treasury bonds, the demand for bondpurchases and for money in general is increased.D. When the Fed buys Treasury bonds, there are more bonds onreserve to enable overnight loans. What happens in Diabetes? Any individual offspring produced through a sexual reproduction is always, Most likely consult to learn about the effects of the modern lumber industry on a countrys forest, would it be 1.An anthropologist 2.An archaeologist 3.A geographer Catherine Chao, Director of Marketing Research, needs a sample of households to participate in the testing of a new toothpaste package. She chooses thirty-six of her closest friends. Catherine's sample is a _____________. I need help right now this is urgent report on review the reading and writing components of the basic school curriculum