<http://webisa.webdatacommons.org/prov/76299851>	<http://www.w3.org/ns/prov#wasDerivedFrom>	<http://webisa.webdatacommons.org/74487917> .
<http://webisa.webdatacommons.org/74487917>	<http://www.w3.org/1999/02/22-rdf-syntax-ns#type>	<http://www.w3.org/ns/prov#Entity> .
<http://webisa.webdatacommons.org/74487917>	<http://www.w3.org/ns/prov#wasQuotedFrom>	<google.com> .
<http://webisa.webdatacommons.org/74487917>	<http://www.w3.org/ns/prov#value>	"purpose, the computer 140 exploits for example a modem (e.g., an ISDN modem) and a dial-up connection, or an XDSL modem and an XDSL connection to the access point 130 b, or a Wireless LAN (WLAN) connection to the access point 130 b (such as a WI-FI???WIreless-FIdelity???connection, a kind of Internet access that is becoming popular in areas such as hotels and airports)." .
<http://webisa.webdatacommons.org/prov/200879660>	<http://www.w3.org/ns/prov#wasDerivedFrom>	<http://webisa.webdatacommons.org/74487917> .