A user logs on to a laptop and opens her email. What device will provide emails to the laptop?

a. Router
b. Hub
c. Server
d. Switch

Answers

Answer 1

Answer:

a. Router

Explanation:

The device that provides emails to the laptop would be the Router. This device is basically the intermediary between your personal computer and the vast internet. It basically decides what information is safe enough to allow into your computer, as well as what the fastest path for the data to travel is. When emails are sent to your address the router allows you to access that information by connecting you to the correct pathways through the internet so that you can view those emails.


Related Questions

Several key people were involved in programming-language development in the 1970s and 1980s

Answers

Answer:

Brian Kernighan and Dennis Ritchie created the C programming language, and Bjarne Stroustrup took it to the next level by creating C++ in the 80's.

Answer:

Bjarne Stroustrup released C++ programming language in the1980s.

Bill Gates and Paul Allen released the first programming language for a personal computer.

Niklaus Wirth developed Pascal to teach programming.

Explanation:

1,3,4

Game Informer (often abbreviated to GI) is an American-based monthly magazine featuring articles, news, strategy, and reviews of popular video games and associated consoles. Formed in August 1991,[1] the magazine has nearly 3 million subscribers according to Andrew Reiner, making it the highest circulated video game magazine,[2] and as of the first quarter of 2007, it is listed as the 23rd largest overall magazine. Game Informer is now ranked among the top four magazines for reaching males 18 to 34.[3] It is owned and published by GameStop Corp., the parent company of the video game retailer of the same name. Due to this, a large amount of promotion is done in-store, which has contributed heavily to its large subscription base,[4] especially as a subscription is included with the store's Gamer's Edge discount card. Contents [hide] · · 1 GI Staff · · 2 Recurring events · · 3 Reviews · · 4 Website · · 5 References · · 6 External links Judging from this introduction, what kind of information would you expect to find in the article? a. How many people subscribe to Game Informer c. A list of games about which Game Informer has written b. Who works for Game Informer d. none of the above

Answers

Answer:

it is d i just took it

Explanation:

There is not any kind of information would you expect to find in the article, hence option d is correct.

What is information?

Information is defined as a vague idea that describes something with the capacity to inform. Information is most fundamentally concerned with the interpretation of what may be sensed. Facts and text elements including a glossary, table of contents, photographs, and captions are characteristics of informational literature.

Game Informer is a consumer advocate who aims to assist gamers in finding games they will enjoy, and it has built a solid reputation for reliable reviews and clear, succinct reporting by an experienced staff. You can access both the PC/Mac browser version of Game Informer as well as the Game Informer app for iOS or Android with a single digital subscription.

Thus, there is not any kind of information would you expect to find in the article, hence option d is correct.

To learn more about information, refer to the link below:

https://brainly.com/question/13629038

#SPJ2

What is one way polymorphism is implemented?


created a new class using an existing class

changing a variable from a string to a float

hiding class variables from the programs using instances of the class

repurposing an operation

Answers

Answer:

repurposing an operation

Explanation:

Got it right

a character that
is raised and smaller above the baseline is called​

Answers

Answer:

A character that  is raised and smaller above the baseline is called​ a superscript.

Explanation:

A character that  is raised and smaller above the baseline is called​ a superscript.

For example, let 'a' be the number and 'n' is the exponent power of the number 3.

aⁿ

The number 'n' above the number 'a' is an example of a superscript.

In another example, let the expression be

4⁶

The number 6 above the number 4 is an example of a superscript.

Therefore, we conclude that a character that  is raised and smaller above the baseline is called​ a superscript.

Please help me I am crying because I don't know
Small computer systems interface and Universal serial bus ports are examples of _____ device Sports

Answers

Answer:ubers texi’s

Explanation:

Write a program that reads a string from the user containing a date in the form mm/dd/yyyy. If the user entered 12/10/2019, then it should print the date in the form December 10, 2019. solution in python.

Answers

Answer:

months = ["January","February","March","April","May","June","July","August","September","October","November","December"]

date = input("mm/dd/yyyy: ")

splitdate = date.split("/")

print(months[int(splitdate[0])-1]+" "+splitdate[1]+", "+splitdate[2]+".")

Explanation:

This line initializes a list of all 12 months

months = ["January","February","March","April","May","June","July","August","September","October","November","December"]

This prompts the user for date

date = input("mm/dd/yyyy: ")

This splits the date into three parts; mm with index 0, dd with index 1 and yy with index 2

splitdate = date.split("/")

The following prints the required output

print(months[int(splitdate[0])-1]+" "+splitdate[1]+", "+splitdate[2]+".")

Analyzing the print statment

splitdate[1] represents the day of the date

splitdate[2] represente the month of the date

However, in months[int(splitdate[0])-1]

First: splitdate[0] represents the month of the year as a string in numeric form e.g. "12", "01"

It is first converted to an integer as: int(splitdate[0])

Then the corresponding month is derived from the month list

Let G = (V, E) be an undirected graph. Design algorithms for the following (in each
case discuss the complexity of your algorithm):
(a) Assume G contains only one cycle. Direct the edges s.t. for each u, indegree(u) [tex]\leq[/tex] 1.
(b) Determine whether it is possible to direct the edges of G s.t. for each u, indegree(u) [tex]\geq[/tex] 1.
If it is possible, your algorithm should provide a way to do so.
(c) Let S be a subset of edges s.t. every cycle of G has at least one edge in S. Find a
minimum size subset S.

Answers

Answer:

i think its b if not sorry

Explanation:

which data representation system is based on the digits 0-9 and is mostly easily interpreted In real wrold situations​

Answers

Answer:

Hexadecimal  data representation system is based on the digits 0-9 and is mostly easily interpreted In real word situations​ .

Explanation:

Hexadecimal manages sixteen different figures: most often the numbers 0–9 to describe values zero to nine, and (A–F) to describe values ten to fifteen. The modern hexadecimal system was first launched into the domain of computing by IBM in 1963. An older description, with 0-9 and u-z, was practiced in 1956 by the Bendix G-15 computer.

Divide a network 10.10.0.0 with subnet mask 255.255.0.0 into 62 subnets.

10.10.0.0
0000 1010. 0000 1010 . 0000 0000 . 0000 0000

255.255.0.0
1111 1111. 1111 1111 . 0000 0000 . 0000 0000

Required:
a. How many bits do we need to borrow from the host portion?
b. List the lowest and the highest IP address of the first usable subnet.
c. How many usable hosts are there in total before and after subnetting?

Answers

Answer:

A. 6 bits

B. lowest IP address is  10.10.0.1  and the highest IP address is  10.10.3.254

C. total number of usable hosts before subnetting = 65534

total number of usable hosts after subnetting = 65408

Explanation:

The IP address 10.10.0.0 with the subnet mask 255.255.0.0 is a class B address with 16 bits of the network address portion and 16 bits of the host portion.

To subnet the address to use 62 subnets (and to reduce the host IP address wasted) 6 bits are borrowed from the host portion of the address to give 2^6 = 64 subnets with two usable host addresses.

The first network address is 10.10.0.0 and the first usable host address of the subnet is 10.10.0.1 making it the lowest address, while the broadcast address is 10.10.3.255 and the address before it becomes the higher address in the network which is 10.10.3.254

The number of usable host of the network before subnetting is 2^16 -2 = 65534, while after subnetting is (2^(16-6) - 2) x 64 = 65408.

What are the similarities and differences between the editor-in-chief, managing editor, assignment editor, and copyeditor? Your response should be at least 150 words.

Answers

Answer:

Editor. An editor is the individual in charge of a single publication. It is their responsibility to make sure that the publication performs to the best of its ability and in the context of competition. A managing editor performs a similar role, but with greater responsibility for the business of the publication.

Explanation:

Which of the following is not an example of Detailed Demographics?
Car ownership status
Homeownership status
Marital status
Parenting stages?

Answers

Answer:

Car ownership status.

Explanation:

While the rest have detailed demographics, demographics of car buyers are, by brand. A detailed demographic of a car ownership 'status' sounds ridiculous.

Write a program that opens an output file with the filename my_name.txt, writes your name to the file, then closes the file. python

Answers

f = open("my_name.txt", "w")

f.write("Your name here")

f.close()

You just have to change Your name here to your actual name. I wrote my code in python 3.8. I hope this helps.

The ________ function deletes all elements of the list.

Answers

Answer:

clear

clear() :- This function is used to erase all the elements of list.

Explanation:

The clear function deletes all elements of the list. The clear method removes all the elements from a list.

What is a function?

Simply said, a function is a “chunk” of code that you may reuse repeatedly rather than having to write it out several times. Programmers can divide an issue into smaller, more manageable parts, each of which can carry out a specific task, using functions.

A list's whole contents are cleared via the clear() method. It returns an empty list after removing everything from the list. No parameters are required, and if the list is empty, no exception is raised. The clear function is present in all languages of computers but has different codes and functions.

Therefore, the list's whole contents are removed by the clear function. All of the elements in a list are removed by the clear method.

To learn more about the function, refer to the link:

https://brainly.com/question/17001323

#SPJ2

Write a while loop that prints user_num divided by 2 until user_num is less than 1. The value of user_num changes inside of the loop. Sample output for the given program:

Answers

user_num = 20

while user_num>= 1:

   print(user_num,"divided by 2 =",user_num/2)

   user_num /= 2

I wrote my code in python 3.8. I hope this helps.

Answer:

user_num = int(input())

while user_num>= 1:

  print(user_num/2)

  user_num /= 2

Explanation:

Simplified it

HURRY HELP
A program contains an if statement followed by an else statement. When the condition in an if statement is met, what happens to the code that follows the else statement ?
it is a name error
it is a syntax error
it is ignored
it is executed

Answers

Answer:

Explanation:

syntax error - with this error the code cannot be executed, its a crucial error within the code

name error - misspell an identifier name, will stop the code from running

ignore error - could be something like grammar ignored, wont stop the code running

executed - it will crash the whole code stopping it from running if it involved any of the errors above

Answer:

it is ingnored because the if statemeant has been met

Explanation:

As a sysadmin you will find yourself doing business with a variety of third party vendors which of these are likely to be rented or bought from a vendors

Answers

Answer:

Printing devices

Video, Audio devices

Communication machines

Explanation:

Printing devices - Sysadmin needs this type of devices for print important data and information.

Video, Audio devices - Sysadmin needs this type of devices for better communication and interaction.

Communication(fax) machines - Sysadmin needs this type of devices for written communication and interaction and deals.

HELP!!! What would var d=?

Answers

Answer:

51015

Explanation:

Var b is a string, and it'll treat addition like string concatenation (aka just adding a message.) Since it's concatenation, it'll then turn the numbers/integers into strings.

This kind of behavior might be different depending on the language, though. Some languages might not allow this. (For example, C and C++)

In ANSI standard C(1989) code - this is what we are teaching- declarations can occur in a for statementas in
for(int i;i<10; i++0.
True
O
False​

Answers

Answer:

true is the answer to this

Compare briefly the general structure of the complete language processor of Java and the language processor of C . (b) Explain the major differences.

Answers

Answer:

The difference to this question can be defined as follows:

Explanation:

Java language processor:

In java, it uses both compiler and interpreter.It uses high-level data is translated by java computer to byte-code, and by this, it transfers to an element, through either java interpreter or the Just-in-time, into electronic format Just-in-time compiler optimizations are generally preferred to the interpretation so because the process is slowed down. Its state of development of java bytecode is moderate (this byte code can run on any machine, on any operating system), therefore JAVA is an independent platform language.

C++ language processor:

In C++, it uses the only compiler. The software is preserved with the .cpp extension. so, that it can be converted to allelopathy of the c++ COMPILER, high - level language. The creation of the byte code is no intermediary, and it is not an independent platform.

I really need help with this question I will give you five stars

Answers

Answer:

A

Explanation:

1, and
Which line of code could be used for a constructor?
e
O definit (firstName, lastName, id Num):
O definit(self, firstName,lastName,idNum):
O def
_init_(firstName, lastName idNum):
O def
_init__(self, firstName,lastName idNum)

Answers

Answer:

i think (first name last name id Num)

Is there anyone who is very good with Microsoft access? ​

Answers

Answer:

na i can boot people offline

Explanation:

Observe the following output and write the complete HTML-CSS code to generate it:

Answers

Answer:

HTML:

<ol start="3">

 <li>English</li>

 <li>Maths</li>

 <li>Physics</li>

 <li>Chemistry</li>

 <li>Biology</li>

</ol>

CSS:

ol {

 color: green;

 font-family: Courier;

 list-style-type: lower-roman;

 border: 2px dotted black;

 width: 200px;

}

li {

 margin-left: 10px;

}

Explanation:

The left margin on the li is not very clean, but it prevents the roman numbers from exceeding the border.

Write a function contains_at() that accepts two sequences (e.g., lists, strings, etc), s and q, and an integer p

Answers

Answer:

Following are the method to this question:

def contains_at (s, q, p):#defining a method contains_at that accepts a list string and an integer.  

Explanation:

In the above-given question, some of the data missing, that's why we define this question as follows:

program for the above the given method:

def contains_at (s, q, p):#defining a method contains_at

   return s,q,p #use return keyword to return parameter value

s="data base"#defining string variable

q=[1,2,3,4,5]#defining a list  

p=3#defining integer variable  

print(contains_at(s,q,p))#use print method to call contains_at method

Output:

('data base', [1, 2, 3, 4, 5], 3)

In the above program, a method contains_at  is declared, which accepts a list, string, and an integer value in its parameters, and use the return keyword to return the above parameter value.

In the next step, a parameter variable is declared, which accepts a value, and use a print method to call the method.

Application software helps run the computer and coordinates instructions with the hardware.
A. True
B. False

Answers

Answer:

A. True

Explanation:

I've got the answer, I just need someone to explain it, please!

Answers

the reason this answer is 80 seconds is because if you add y(30 sec) + z(50 sec) = 80 seconds which would be the two processors

The create_python_script function creates a new python script in the current working directory, adds the line of comments to it declared by the 'comments' variable, and returns the size of the new file. Fill in the gaps to create a script called "program.py". 1- def create_python_script(filename): 2 comments = "# Start of a new Python program" with open("filename", "w+") as file: file.write(comments) import os filesize - os.path.getsize(filename) print("The size of the file is:") return(filesize) Reset 3 4 5 6 7 Run 9 10 11 print(create python script("progran.py"))

Answers

Answer:

import os

def create_python_script(filename):

   comments = "# new python script file"

   with open(filename,"w+") as file:

       file.write(comments)

   filesize = os.path.getsize(filename)

   print(f"The size of the file is: {filesize}")

create_python_script("program.py")

Explanation:

The os module is a built-in python file that is used to interact with the operating system terminal. The with keyword is used to create and open a file with write privileges with no need to close the file.

The path.getsize() method is used to get the size of the newly created file which is printed in the console.

On a flowchart, what does an oval represent?

a
output

b
process

c
start or stop

d
input

Answers

On a flowchart, start or stop does an oval represent.

Bob is having no luck performing a penetration test on Retail Store's network. He is running the test from home and has downloaded every security scanner that he could lay his hands on. Despite knowing the IP range of all the systems, and the exact network configuration, Bob is unable to get any useful results. Why is Bob having these problems?

Answers

Incomplete question. The full question read;

Why is Jim having these problems?

Options:

A. Security scanners are not designed to do testing through a firewall.

B. Security scanners cannot perform vulnerability linkage.

C. Security scanners are only as smart as their database and cannot find unpublished vulnerabilities.

D. All of the above.

Answer:

D. All of the above.

Explanation:

Remember, security scanners are only designed to gather information about a network, but not with the ability to perform firewall testing. Also, these security scanners are pre-programmed with existing vulnerabilities in their database, and so it would impossible to discover vulnerabilities on the Retail store's network.

Hence, since Bob is using the wrong tools, he is unsuccessful in performing a penetration test.

Identify some cases of violations of user privacy from current literature and their impact on data science as a profession.

Answers

Explanation:

Remember, the term "violations of user privacy" is usually used when an entity without seeking users' consent uses or sells the private information of people (or users) in a way the users would view as inappropriate.

For example, in 2020, one of Mark Zuckerberg's company was recently accused of secretly watching its user who had the app installed on their phone via their smartphone front camera without their knowledge.

Another prominent case is that of ride-sharing company Uber, in 2018, they were accused of not taking seriously the protection of users privacy after they've experienced a data breach that exposed their customer's personal information, such as phone numbers, addresses, and email addresses. They were penalized as result by a court.

Other Questions
Alan and Monica tested how fertilizer X affected the growth of a plant. Alan and Monica put 100 grams of fertilizer X in pot 1. They put 0 grams of fertilizer X in pot 2.What is pot 2 called in science? A. a test group B. a data group C. an observational group D. a control group Which equation has the graph shown? How would a female student tell you that she is Mexican?A. Soy mxica.B. Soy mexicano.C. Estoy mexicana.D. Soy mexicana. Enter the mixed number as a decimal to four decimal places. 9 1 30 = ... if you were to cut a piece of paper in half 32 times, what fraction would this represent? Where were the first American railroads built?A. In the SouthB. In the citiesC. In the NorthD. Along the coastSUBIS ASAP PLS ASAP....,..,...: 48 is 32% of what number? The Second Great Awakening: a) focused on reforming Southern social structure. b) encouraged people to persecute Mormons. c) led to many reform movements throughout the the U.S., such as prohibition and women's suffrage. d) was an attempt by U.S. religious groups to prevent a civil war. hi i'm really struggling with this and its due later today! If someone could show the work of how to do it and the answer that would be really appreciated!! What was the Virginia Plan?O Each slave would count as 1 person when determining state population forrepresentationO There would be two houses, one based on population and one with equalrepresentation.O Each state would be represented by a number of representatives based on itspopulationO Each state would be represented by an equal number of representatives. she cannot play boxing into passive voice PLZ HELP On a farm 14 goats are male, and 11 of them are female goats. What percentage of these goats are male Evaluate the equation.196b = 450.8 If the Great War were to start in 2021 who would be on what side? Please help me, Ill mark Brainliest to the most well explained answer cause I dont understand. As an employee, who is supposed to provide training on the chemicals you are handling or come in contact with at work? Select the best option. Distributor Government Manufacturerenployer PLEASE HELP I WILL GIVE YOU BRAINLIEST PLS EXPLAIN!!!! True or False?A triangle can have side length of 3, 2, and 4.O TrueFalse Which of the following conventions did Egyptian artists use in tomb sculptures? forms with no projecting parts that could break lively poses that entertained the pharaohs ka lifelike proportion and anatomy dramatic facial expression and emotion Steam Workshop Downloader