What major trade network allowed china to trade items and technology (like guns) with eurasia?

Answers

Answer 1

The major trade network that makes China allowed to trade items and technology with Eurasia is Silk Roads. A network of Eurasian commercial routes known as the Silk Road operated from the second century BCE to the middle of the 15th century.

The Silk Road length of more over 6,400 kilometers (4,000 miles) was crucial in promoting East-West connections in terms of politics, religion, and culture. The term "Silk Road," which was first used in the late 19th century, has become less popular among contemporary historians in favor of the term "Silk Routes," which better captures the intricate network of land and sea routes linking East and Southeast Asia, the Indian subcontinent, Central Asia, the Middle East, East Africa, and Europe.

Learn more about The Silk Road https://brainly.com/question/6668560

#SPJ4


Related Questions

write a program that is given two integers representing a speed limit and driving speed in miles per hour (mph), calls the function calculate ticket cost() and outputs the traffic ticket amount.

Answers

The program that is given two integers representing a speed limit and driving speed in miles per hour is given below:

The Program

def ask_limit():

  limit = float(input ("What was the speed limit? "))

   return limit

def ask_speed():

   speed = float(input ("What was your clocked speed? "))

   return speed

def findfine(speed, limit):

   if speed > 90:

       bigfine = ((speed - limit) * 5 + 250)

       print "your fine is", bigfine

   elif speed <= limit:

       print "you were traveling a legal speed"

   else:

       fine = ((speed - limit) * 5 + 50)

       print "your fine is", fine

def main():

  limit = ask_limit()

   speed = ask_speed()

   findfine(speed, limit)

main()

Read more about computer programs here:

https://brainly.com/question/23275071

#SPJ1

The _____ was created to give a standardization to the linux filesystem structure.

Answers

The Filesystem Hierarchy Standard was created to give a standardization to the linux filesystem structure. The term "Filesystem Hierarchy Standard" refers to a convention that is applied to the UNIX operating system.

Even if they are stored on several physical or virtual media, all files and directories in the FHS are found under the root directory, which is /. Some of these folders are installed with specific subsystems, such the X Window System, in order to function on a specific system. All operating systems that resemble Unix have the majority of these directories, and they are typically utilized in very similar ways.

Learn more about linux filesystem structure https://brainly.com/question/9711472

#SPJ4

Write l for law of enrtia,ll for law of Acceleration and lll for law of enteraction.

___1)Empty grocery cart runs faster than the loaded one.
___2)Using Seatbelt to hold your body from leaning forward when a car you are riding suddenly stops.
___3)While rowing a boat,paddling will cause the bat to moved forward.
___4) A biker slightly presses the brake as his bike travels down on a slope.
___5)lt is easier for you to move a box with relief goods when helped by friends than moving it all by yourself.
___6) A toy truck with loads runs slower compared to a toy truck with empty loads when you pushed them at the same time.
___7) A kid catches a flying boomerang and stopping its motion.
___8)Your hand hurts when you punch someone hard.
___9)Rocket propulsion or when rocket lifts off from a shuttle System.
___10)A cart at rest start moving once someone pushes it forward.

this is for SCIENCE SUBJECT​

PLEASE ANSWER IT PROPERLY BECAUSE I NEED IT UNTIL TOMMOROW MORNING...

Answers

[tex]{ \qquad\qquad\huge\underline{{\sf Answer}}} [/tex]

Statement 1 : ll

Empty grocery cart runs faster than the loaded one.

By Newton's second law ( law of Acceleration ) :

[tex]\qquad \sf  \dashrightarrow \: F = ma [/tex]

If the mass is less, less force will be exerted to move it. hence empty cart runs faster than full cart as it requires more force.

Statement 2 : l

Using Seatbelt to hold your body from leaning forward when a car you are riding suddenly stops.

By Newton's first law ( law of inertia ) :

" An object has tendency to resist change in its state until any external unbalanced force is applied on it. "

So, while driving our state is in motion, and when we apply brake, it's change of state from motion to rest, hence by law of inertia, our body still keep up in motion, that makes us to lean forward.

Statement 3 : lll

While rowing a boat,paddling will cause the bat to moved forward.

By Newton's third law ( law of enteraction ) :

" Every action has an equal and opposite reaction "

when we paddle, we push (apply force on) the water backwards, and hence water exerts a force on us in forward direction that let us move accordingly in water.

Statement 4 : ll

A biker slightly presses the brake as his bike travels down on a slope.

By Newton's second law ( law of Acceleration ) :

[tex]\qquad \sf  \dashrightarrow \: F = ma [/tex]

A biker applies brake when it's a slope, because it's acceleration increases significantly when it goes down the slope and to maintain the speed he applies a brake to slow down. ( increase in Acceleration causes bike to move fast, as more force is exerted )

Statement 5 : ll

lt is easier for you to move a box with relief goods when helped by friends than moving it all by yourself.

By Newton's second law ( law of Acceleration ) :

[tex]\qquad \sf  \dashrightarrow \: F = ma [/tex]

By the given formula we can clearly conclude that, to move a bulky object ( having heavy mass ), greater force is required, so we call for help as we can easily increase the force when there's more than one person pushing it.

Statement 6 : ll

A toy truck with loads runs slower compared to a toy truck with empty loads when you pushed them at the same time.

By Newton's second law ( law of Acceleration ) :

[tex]\qquad \sf  \dashrightarrow \: F = ma [/tex]

If same force is exerted on heavy and light object, Acceleration of that of lighter body will be more than that of bulky body, so.. the truck with load on it has more mass than truck with no load, hence truck with load moves slower.

Statement 7 : l

A kid catches a flying boomerang and stopping its motion.

By Newton's first law ( law of inertia ) :

" An object has tendency to resist change in its state until any external unbalanced force is applied on it. "

When the kid catches the boomerang it was in motion, so it resists to come at rest, Therefore we need to apply a force and with time it comes to rest.

Statement 8 : lll

Your hand hurts when you punch someone hard.

By Newton's third law ( law of enteraction ) :

" Every action has an equal and opposite reaction "

As we hit something hard, it feels painful because when we apply force on that hard object it applies the same force on our palm that results in pain.

Statement 9 : lll

Rocket propulsion or when rocket lifts off from a shuttle System.

By Newton's third law ( law of enteraction ) :

" Every action has an equal and opposite reaction "

In order to go up in the sky, one rocket applies a force download by the process of propulsion and hence by Newton's third law, a force of same magnitude is applied on it that cause Rocket to lift up.

Statement 10 : ll

A cart at rest start moving once someone pushes it forward.

By Newton's second law ( law of Acceleration ) :

[tex]\qquad \sf  \dashrightarrow \: F = ma [/tex]

Acceleration in a body is caused by force acting on it, so to move a car ( Accelerate ) we push it forward ( apply force ).

Discuss the importance of documenting network problems and solutions. what can be done if a lack of time interferes with the documentation process?

Answers

The following justifies the importance of network documentation:

The right documentation might spare you from conducting time-consuming research to solve persistent issues. Consistency across the network helps to eliminate issues and errors when everything is in place and everyone adheres to the same rules and procedures. In the event that a knowledgeable employee leaves the organization, you won't lose crucial information. You can rapidly onboard new hires thanks to the documentation. When problems arise with your network, you can debug them more quickly.

A technical record of the network's hardware, software, servers, directory layout, user profiles, data, and how everything interacts. Any information that aids administrators and IT specialists in maintaining the network should be included in network documentation.

Learn more about documentation https://brainly.com/question/14096715

#SPJ4

Many feel that the future of gaming will involve __________ , where humans can experience realistic environments that are simulated by computers.

Answers

Many feel that the future of gaming will involve virtual reality, where humans can experience realistic environments that are simulated by computers.

What is Virtual Reality (VR)?

Virtual Reality (VR) can be defined as a computer technology through which virtual images of any physical environment (realities) and human-machine interactions are displayed, especially through the use of various computer technologies and wearables.

The elements of Virtual Reality (VR).

Generally, some of the elements of Virtual Reality (VR) include the following:

Life interactionSelf projectionTelexistence3D space or model.

In this context, we can reasonably infer and logically deduce that Virtual reality is a computer technology which is designed and developed to simulate a three-dimensional (3D) environment through which humans can explore and interact with realistic environments in games.

Read more on Virtual Reality here: brainly.com/question/26705841

#SPJ1

A computer that has a parallel architecture uses multiple central processing units. True or false

Answers

Answer:

This is true.

Explanation:

(a) which algorithm is used to digitize a voice signal for transmission in a digital circuit-switched network? (b) at which data rate is the voice signal transmitted?

Answers

Pulse code modulation (PCM) algorithm is used to digitize a voice signal for transmission in a digital circuit-switched network

An average voice channel in a circuit switched digital telecommunications network uses a 64 kbit/s timeslot. For the purpose of digital transmission, an analogue voice signal is transformed using the pulse code modulation (PCM) technique.

In order to represent sampled analogue signals digitally, one technique is pulse-code modulation (PCM). It serves as the industry standard for digital audio in applications such as digital telephony, compact discs, and computers.

Sampling, quantization, and coding are the three processes in the Pulse Code Modulation process.

The telephone network (POTS) uses PCM (Pulse Code Modulation), a standardised technique, to convert an analogue signal to a digital one. First, an 8-kHz sampling rate is used to sample the analogue signal.

Learn more about voice signal:

https://brainly.com/question/28544369

#SPJ4

bring your own devices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.

Answers

Fair information practices is a broad word for a set of guidelines that control the gathering and use of personal data and address concerns about accuracy and privacy. The Fair Information Practice Principles are the outcome of the Commission's investigation of the methods.

Here are the five fundamental tenets of fair information practices. First, notice should be given to customers. Second, choices should be offered and consent required. Third, data should be accessible to and modifiable by consumers. Fourth, data should be accurate and secure. Fifth, mechanisms for enforcement and redress are necessary

Learn more about code of fair information practices https://brainly.com/question/15685630

#SPJ4

If you're running a server, which one of the follow operating systems would be best suited for your server?

Answers

If you're running a server, the operating system that would be best suited for your server is Ubuntu server.

What is Ubuntu Server used for?

Ubuntu Server is known to be a type of a server operating system, that is known to have been created  by Canonical and open source programmers all over the world.

It is known to be one that works with almost any hardware or virtualization platform and as such, one can say that If you're running a server, the operating system that would be best suited for your server is Ubuntu server.

Learn more about operating system  from

https://brainly.com/question/22811693

#SPJ1

The systems such as computers and telecommunications, used for storing, retrieving, and exchanging information is information technology.
true or false

Answers

The systems such as computers and telecommunications, used for storing, retrieving, and exchanging information is information technology is a true statement.

What is information technology meaning?

Information technology (IT) is known to be a broad professional form or group that tend to cover some areas of  functions such as:

Building communications networkssafeguarding data and informationTroubleshooting computer problems, etc.

Therefore, The systems such as computers and telecommunications, used for storing, retrieving, and exchanging information is information technology is a true statement.

Learn more about information technology  from

https://brainly.com/question/14688347
#SPJ1

Liam noticed someone had accessed his social media account and made several posts without his knowledge. Which of the following practices will keep unauthorized users from gaining access to his online accounts?

Answers

Answer:

Liam could, Change the password,

Explanation:

change the password, so the password would be difficult to guess.

Avoid logging onto social media on public computers or WiFi connections.

Don't giving out account information to friends and avoid opening suspicious links and emails.

DON:T opening suspicious links or emails could allow malware to infect your computer the moment you open them.

HOpe this HelPed

why is technology bad for you

Answers

Answer: Constant device use might strain your eyes. It can cause a headache, focus issues, itching, blurred or double vision, and light sensitivity. This is one of the main arguments against technology that we may make.

Explanation:

An employee has received a digital photo frame as a gift and has connected it to his/her work pc to transfer digital photos. the primary risk that this scenario introduces is that?

Answers

The primary risk that this scenario introduces is that: B) the photo frame could be infected with malware.

What is a malware?

A malware can be defined as any type of software program or file that is designed and developed to be intentionally harmful to the host computer, server, or network, especially for the purpose of wreaking havoc, damage and destruction after gaining an unauthorized access.

The primary risk which connecting a work pc to transfer digital photos that were received as a gift from an external source without scanning with an antivirus is that the photo frame could be infected with malware.

Read more on malware here: https://brainly.com/question/24811303

#SPJ1

Complete Question:

An employee has received a digital photo frame as a gift and has connected it to his/her work PC to transfer digital photos. The PRIMARY risk that this scenario introduces is that:

A) the drivers for the photo frame may be incompatible and crash the user's PC.

B) the photo frame could be infected with malware.

C) the photo frame storage media could be used to steal corporate data.

D) the employee may bring inappropriate photographs into the office.

exercise 1.11 convert the following unsigned binary numbers to decimal. a) 10102 b) 1101102 c) 111100002 d) 00011000101001112 exercise 1.12 repeat exercise 1.11, but convert to hexadecimal.

Answers

1.11 will be converted into 0001100010100111₂ unsigned binary numbers to decimal. Thus, option D is correct.

What is binary numbers?

The base-2 notation, often known as the binary representation, is a way of expressing numbers in mathematics that employs simply two values, mainly "0" and "1."

The  1.11  will be The binary number that can be repeated in the form of 1 and 0 these numbers can be in any coding or any form but there are only two numbers that are being used to create  0001100010100111₂ in the unsigned binary numbers to decimal.

Therefore, option D is the correct option.

Learn more about binary numbers, here:

https://brainly.com/question/28222245

#SPJ1

a memory location whose content is not allowed to change during program execution is known as a .

Answers

A memory location whose content is not allowed to change during program execution is known as a: D. Named Constant.

What is a variable?

A variable can be defined as a specific name which refers to a location in computer memory and it is typically used for storing a value such as an integer.

This ultimately implies that, a variable refers to a named location that is used to store data in the memory of a computer. Also, it is helpful to think of variables as a container which holds data that can be changed in the future.

In Computer technology, a named constant can be defined as a memory location in a software whose content must not change during program execution.

Read more on named constant here: https://brainly.com/question/9016384

#SPJ1

Complete Question:

A memory location whose content is not allowed to change during program execution is known as a

answer choices

Modulus

Null (empty)

Newline Escape

Named Constant

Critical thinking: why would the network designers include fragmentation (segmentation) as a function instead of just requiring all packets to be a certain size? be specific.

Answers

The reason why  network designers include fragmentation (segmentation) as a function  instead of just requiring all packets to be a certain size is the fact that it helps to improve security as well as make a predictable traffic flows.

What is Packet fragmentation?

IP fragmentation is known to called an Internet Protocol (IP) process that tends to breaks down packets into little  pieces (fragments), so that the outcome of those pieces can be able to pass through a link with a little maximum transmission unit (MTU) than when compared to original packet size.

Note that by the act of fragmenting data packets and also sending a lot of packet, it is one that tends to have shorter transmission frames, all of the transmission will also be made up a lower probability of having a collision with a Bluetooth packet.

The reducing of the frame size tends to increases the percentage of overhead bits that is used in the transmission.

Therefore, The reason why  network designers include fragmentation (segmentation) as a function  instead of just requiring all packets to be a certain size is the fact that it helps to improve security as well as make a predictable traffic flows.

Learn more about fragmentation from

https://brainly.com/question/26260432

#SPJ1

Mystring is declared as a string and is the only variable declared. which is a valid assignment?

Answers

Since myString is declared as a string and is the only variable declared. the  valid assignment is myString = "H";

What is myString?

The term  MyString(int currentSize) is known to be a kind of a constructor that is known to be used for an empty string of the currentSize elements.

What is an Object?

The "objects" is know to be a tool that is used to make a C++ program and they are known to be called classes.

Note that  a class is said to be organized such as or the same as a data structure in C and A class is one that is made up any number of variables just similar to  a data structure, but it also has  all of the functions that work on that data.

Therefore, Since myString is declared as a string and is the only variable declared. the  valid assignment is myString = "H";

Learn more about myString from

https://brainly.com/question/27812580

#SPJ1

myString is declared as a string and is the only variable declared. Which is a valid assignment?

myString = 'Hello';

myString = Hey;

myString = "H";

myString = [Hoy];

Constructor methods should always be defined with what access? a. private b. protected c. public d. common

Answers

Constructor methods should always be defined with private access. Thus, option A is correct.

Who is Constructor?

The information elements of a specific element are often initialized by constructors, which share a same namespace as the subclass or struct.

A person who is the constructor usually have a design which is being made by him of all the amenities that he has installed with a full roof plan and floor planning.

This document is frequently considered as private as the people may misuse the information of the data that is being presented to them. Therefore, option A is the correct option.

Learn more about Constructor, here:

https://brainly.com/question/12997980

#SPJ1

Why would the network designers include fragmentation (segmentation) as a function instead of just requiring all packets to be a certain size? be specific.

Answers

The reason why network designers include fragmentation (segmentation) as a function  instead of just requiring all packets to be a certain size is the fact that it helps to improve security as well as make a predictable traffic flows.

An Internet Protocol (IP) process known as IP fragmentation tends to split up packets into little parts (fragments), allowing the result of those pieces to flow through a link with a smaller maximum transmission unit (MTU) than when compared to original packet size.

It is important to keep in mind that by fragmenting data packets and delivering several packets, which tend to have shorter transmission frames, there is a decreased chance that a transmission may collide with a Bluetooth packet.

The fraction of overhead bits used in the transmission tends to rise as the frame size is decreased.

Thus, rather to only requiring that all packets be a specific size, network designers incorporate fragmentation (segmentation) as a function since it enhances security and creates predictable traffic patterns.

Learn more about fragmentation:

https://brainly.com/question/26260432

#SPJ4

select the entry that correctly uses mla style for in-text documentation. the student is providing in-text documentation for the following online source, which includes no page numbers:

Answers

The entry that correctly uses MLA (2016) style for in-text documentation is: that of Walker.

What is MLA in-text documentation?

MLA format is known to be one that tends to follows the author-page king or way of in-text citation.

Note that in this method, it implies  that the author's last name as well as the page number(s) from whence the quotation or paraphrase is said to be taken from is one that needs to or must appear in the text, and there is found also a complete reference that need to appear on your Works Cited page or reference.

Therefore, The entry that correctly uses MLA (2016) style for in-text documentation is: that of Walker in the image attached.

Learn more about MLA (2016) style  from

https://brainly.com/question/13959275

#SPJ1

Select the entry that correctly uses MLA (2016) style for in-text documentation.

The student is providing in-text documentation for the following online source, which includes no page numbers:

Walker, Rob. "Stuck on You." The New York Times Magazine, 3 June 2010, www.nytimes.com/2010/06/06/magazine/06fob-consumed-t.html. Accessed 9 June 2010.

The word ____ is used to indicate that a program is permanently held in rom (read only memory), as opposed to being held in secondary storage.

Answers

The word firmware is used to indicate that a program is permanently held in ROM (read only memory), as opposed to being held in secondary storage.

What is a software?

A software can be defined as a set of executable instructions that is typically used to instruct a computer system on how to perform a specific task (function) and proffer solutions to a particular problem.

Types of computer memory.

In Computer technology, there are two (2) main types of memory or storage location for software program (application) that are being used on a computer and these include;

Read only memory (ROM)Random access memory (RAM)

Generally, firmware is a terminology which is used to indicate that a software program is permanently held in read only memory (ROM), as opposed to being held in the secondary storage of a computer.

Read more on firmware here: https://brainly.com/question/10875640

#SPJ1

Complete Question:

The word _____ is used to indicate that a program is permanently held in ROM (read only memory), as opposed to being held in secondary storage.

a. firmware

b. shareware

c. hardware

d. software

what is the output from the following java program? (assume that a tab is expanded into eight spaces.) public class letter {

Answers

The output from the following java program is given below:

public class Letter {

   public static void main(String[] args) {

       System.out.println("Dear \"DoubleSlash\" magazine,");

       System.out.println();

       System.out.println("\tYour publication confuses me.  Is it");

       System.out.println("a \\\\ slash or a //// slash?");

       System.out.println("\nSincerely,");

      System.out.println("Susan \"Suzy\" Smith");

   }

}

The Output

Dear "DoubleSlash" magazine,

       Your publication confuses me.  Is it

a \\ slash or a //// slash?

Sincerely,

Susan "Suzy" Smith

The given code declares variables, defines a method and gives commands..

It creates a public class and then uses print commands to tell the compiler the output to give and the output is given above.

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

Which wi-fi standard uses beamforming to allow an app to send data to multiple devices simultaneously?

Answers

Answer: 802.11n

Explanation: uses only MIMO technology. In this, signal send by separate antennas and sends multipath signals. The signals slightly goes out of the range. So we cannot send data in multiple devices simultaneously.

Which of the following statements is true about personality
tests?
Personality tests can guide you towards the options
that may be the best fit for you.
Personality tests can predict how successful you'll be
in a specific career or field of study.

Answers

The true statement is true about personality tests is that Personality tests can guide you towards the options that may be the best fit for you.

What is meant by personality test?

Personality tests are known to be a kind of a test that has been set up to systematically bring out information about a person in regards to their motivations, preferences as well as their interests, emotional make-up, and style of communicating with people and issues.

Therefore, The true statement is true about personality tests is that Personality tests can guide you towards the options that may be the best fit for you.

Learn more about personality tests from

https://brainly.com/question/1360758

#SPJ1

one of the ways web mining improves web experiences is through site visibility. site visibility includes how and the website appears when queries are executed in a search engine.

Answers

Site visibility includes how and when the website appears when queries are executed in a search engine.

What is site visibility?

The term Site visibility is known to be called Website Visibility and this is said to be regarded as a kind of the process of obtaining your website that is said to be found on the internet if  your prospects are said to be searching for any linked or  related products and services.

Note that one of the best ways to be able to boast or increase your site visibility is to get your site to be one that is ranked first in the main search engines.

Therefore, since one of the ways web mining improves web experiences is through site visibility, Site visibility includes how and when the website appears when queries are executed in a search engine.

Learn more about visibility from

https://brainly.com/question/24029870
#SPJ1

use a web browser connected to the internet to explore the career options in cybersecurity at the u.s. national security agency. for what kind of infosec jobs does the nsa recruit? what qualifications do the jobs you found call for?

Answers

Infosec jobs does the NSA recruit are:

Exploitation AnalystCyber Network ProcessionalForensic AnalystTechnology Acceleration FieldLanguage AnalystQuantum ResearcherCryogenic EngineerSystem ArchitectFabricationResearch PhysicistCyber Security (for internship program)

Job qualifications that I found call for is the National Security Agency Cybersecurity (for internship program) are:

Have U.S. citizenship;Be qualified for a TS/SCI/TK security clearance after passing a background check that includes a Full-Scope Polygraph and a Psychological Evaluation;Have a preferred cumulative GPA of 3.0 or better for all previously completed college work;At the time of application, be enrolled in an undergraduate, graduate, or doctoral program in college;Be available and present in the United States between November 2022 and March 2023 for operational and technical interviews as well as other relevant processes, both in person and over the phone/internet;Pursue a major in cybersecurity or a field that is closely related to it.

Cybersecurity is the process of protecting systems, data, networks, and programs from digital threats or attacks. Usually, these attacks are carried out by irresponsible parties for various things.

Learn more about cybersecurity https://brainly.com/question/24856293

#SPJ4

What is the BEST example of a story that corporate media would likely choose NOT to cover?A.
election results for national races

B.
tax breaks provided to large corporations

C.
stricter requirements for teen drivers’ licenses

D.
poor water quality in underserved communities

Answers

The best example of a story that corporate media would likely choose not to cover is: B. tax breaks provided to large corporations.

What is corporate media?

Corporate media can be defined as a terminology which describes a collection of mass media production, ownership, distribution,  and funding which is typically dominated by large corporations and their top executive management (CEOs).

This ultimately implies that, corporate media is a media system which is more than likely not to serve the public interest in its production and reportage of activities that affects its business and the government. Simply put, corporate media is biased and secretive in its reportage of public issues.

In this context, we can reasonably infer and logically deduce that the best example of a story that corporate media would likely choose not to cover is tax breaks provided to large corporations.

Read more on corporate media here: https://brainly.com/question/28097605

#SPJ1

Some cmos setup programs allow you to control the ata security mode feature set, also commonly referred to as?

Answers

Some CMOS setup programs allow you to control the data security mode feature set, also commonly referred to as drive lock.

What is set up programs?

A set of a program is being defined as a program that is being installed in the computer through which the setup of various apps all the data is being done.

You can manage the information security protection functionality, often known as drive lock, using some CMOS configuration applications.

Drive lock is required by the software or a laptop in this hard drives are being encrypted so that no viruses or any sort of practices is being done with the hard drive properties or data tape.

Learn more about set up programs, here:

https://brainly.com/question/14652195

#SPJ1

In order to connect to the internet via the web you will need communications hardware, browser software and a(n)_____,

Answers

In order to connect to the internet via the web you will need communications hardware, browser software and a(n) Internet Service Provider.

What does internet service provider mean?

An ISP (internet service provider) is known to be called any firm or a company that tend to carry out or give people and organizations access to the internet as well as  other linked services.

Note that an ISP is said to possess the equipment as well as the telecommunication line access that is known to be needed to have a  place of presence on the internet.

Therefore, In order to connect to the internet via the web you will need communications hardware, browser software and a(n) Internet Service Provider.

Learn more about Internet Service Provider from

https://brainly.com/question/23902843

#SPJ1

power system protection: fundamentals and applications (ieee press series on power and energy systems)

Answers

An authoritative and comprehensive introduction to power system protection is provided in the book Power System Protection: Fundamentals and Applications (IEEE Press Series on Power and Energy Systems) by John Ciufo.

This book is ideal for new and early-career engineers and technicians. The book provides essentials utilizing an approachable combination of theory and practical application, regardless of the device or manufacturer.

To help the reader comprehend and recall the material contained therein, it provides a variety of examples and simple-to-grasp visuals. This book is also perfect for specifying power system equipment, system operators, and system planning engineers

Learn more about learning for engineer https://brainly.com/question/15016108?

#SPJ4

Other Questions
How manystatesupportedcolleges forwomen werethere inantebellumMississippi? at a particular temperature, the solubility of co in water is 0.13 m when the partial pressure is 1.5 atm. what partial pressure (in atm) of co would give a solubility of 0.080 m? free cash flow catering corp. reported free cash flows for 2013 of $8 million and investment in operating capital of $2 million. catering listed $1 million in depreciation expense and $2 million in taxes on its 2008 income statement. what was catering's 2013 ebit? Solve inequality. 9 a Two shops rent canoes for a rental fee plus a fee per hour. The table shows the total cost (in dollars) for x hours at Shop B is represented by the equation y=4x+6. Which shop charges less per hour? How many hours must a canoe be rented for the total costs to be the same? (PLEASE SHOW WORK) Which of these careers is most likely to be appropriate for a person whovalues adventure?OA. factory workerOB. bank tellerOC. firefighterOD. receptionist Jazz is an art form of individual expression, but unlike many other art forms, it is spontaneous. that means? How to Write 209.105 in expanded form Which of the following describes the end behavior of the function f(x) = root(x, 3) - 4 as approaches infinity ? beatriz milhazes' carambola is based on . the shapes, forms, and bright colors of brazilian culture the art of the ancient maya culture the realistic influences of traditional latin art a calm, peaceful interpretation of color Which of the following is defined as combinations of soil particles that vary in size and shape?a.clayb.aggregatesc.siltd.loam what are the next 2 numbers in 0.006 0.6 6 ___ ____ ?? A small insect viewed through a convex lens is 1.8 cmcm from the lens and appears 2.5 times larger than its actual size. part a what is the focal length of the lens? B.b. king became so influential in the blues that he has been referred to using royall terminology. especially with the accolade ____ of the blues I need help getting this done! I dont understand how to do this so I need help! (e) What ecological factors and human decisions will influence the actual rise in CO concentration? Defining competitors as companies that are trying to satisfy the same customer need or build relationships with the same customer group is using a(n) __________ point of view. Common sources of new business opportunities include ________, ________, and ________. Which domain would allow the inverse of y =cos(x) How is the apprenticeship program in France different than the education you receive in the United States (U.S.)?