<http://webisa.webdatacommons.org/prov/76299851> <http://www.w3.org/ns/prov#wasDerivedFrom> <http://webisa.webdatacommons.org/74487917> . <http://webisa.webdatacommons.org/74487917> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://www.w3.org/ns/prov#Entity> . <http://webisa.webdatacommons.org/74487917> <http://www.w3.org/ns/prov#wasQuotedFrom> <google.com> . <http://webisa.webdatacommons.org/74487917> <http://www.w3.org/ns/prov#value> "purpose, the computer 140 exploits for example a modem (e.g., an ISDN modem) and a dial-up connection, or an XDSL modem and an XDSL connection to the access point 130 b, or a Wireless LAN (WLAN) connection to the access point 130 b (such as a WI-FI???WIreless-FIdelity???connection, a kind of Internet access that is becoming popular in areas such as hotels and airports)." . <http://webisa.webdatacommons.org/prov/200879660> <http://www.w3.org/ns/prov#wasDerivedFrom> <http://webisa.webdatacommons.org/74487917> .