There are two major types of wireless networks that are popular today among users. These networks are Wi-Fi and ____

Answers

Answer 1

Answer:

That would be Bluetooth

Explanation:

As Bluetooth is the most widely used network. It is used to operate many things, such as:

Headphones

Speakers

Remotes

etc.


Related Questions

Why does a computer need programs? ​

Answers

To run successfully. That was the answer on my quiz. Sorry if it doesn’t help
The computer is just a platform, the key is what to use it for. This is program

open accomplishing your task I was able to​

Answers

Answer:

WTH KINDA QUESTION IS THIS !

I DON'T UNDERSTAND DUDE

What is the ghosted text or picture behind the content on the page?​

Answers

Answer:

Watermark

Explanation:

This is actually called a Watermark. It is usually used as a way of showing the name or logo of the author who owns the content that is underneath the watermark. This is done so that individuals cannot steal the owner's work and use it as their own. Usually, the owner has the original version of the content without any watermark, as well as individuals that have purchased the content or a licence to use the content for personal or commercial usage.

What are the characteristics of an attachment in an email?
O The attachment will always appear in the body of the message.
O The paperclip icon indicates an attached file.
O Bold red type indicates an attached file.
O The attachment can only be viewed if it is in HTML format.

Answers

Answer : the paper clip icon indicates the attached file

what is the fullform of ETA in computer term​

Answers

Answer:

Estimated Time of Arrival.

Discuss if you think technology, mobile apps, and/or social networks make us lazy or not. Justify your answer.
Identify ways that you’ve seen social media affect people in the workplace or in society (whether positively or negatively).
Analyze technology’s impact (and in particular, consider social media and mobile apps) on your own life.

Answers

Answer:

Yes, I do you can't just go out and work, play, or anything outside and people just want to stay inside on electronics like phones, tv, game systems.

Explanation:

   In truth, technology has made a lot of difference in our society, but it has also transformed humans into lazy-bones. These days, people don't need to run errands anymore; they push a button on their phone (another product of tech) and have most of the human's first world problems solved

write a program to generate following series in qbasics 100,81,64,....1​

Answers

Answer:

[tex]9 \times 9 = 81 \\ 8 \times 8 = 64 \\ 7 \times 7 = 49 \\ 6 \times 6 = 36 [/tex]

it's square root number you multiple times by 2

Adobe gives away the Acrobat Reader to build a market for the sale of software that creates Acrobat files. This is an example of:

Answers

Group of answer choices.

A. firms giving away products for half of a two-sided market to seed the market.

B. one market attempting to conquer a new market by making it a subset, component, or feature of its primary offering.

C. firms spreading costs across increasing units of production or in serving multiple customers.

D. firms taking advantage of complementary products developed for a prior generation of technology.

E. markets, once considered distinctly separate, beginning to offer similar features and capabilities.

Answer:

A. firms giving away products for half of a two-sided market to seed the market.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

Basically, softwares are categorized into two (2) main categories and these are;

I. Open-source software.

II. Proprietary software.

An open-source software is a type of software in which end users are granted the permission to use, study, modify, copy and share the software with its source code anyhow.

In this scenario, Adobe giving away the Acrobat Reader to build market for the sale of software that creates Acrobat files. Thus, this is an example of firms giving away products for half of a two-sided market to seed the market.

when files on storage are scattered throughout different disks or different parts of a disk, what is it called

Answers

Answer:

File Fragmentation or Fragmented Files

An item that contains both data and the procedures that read and manipulate it is called a(n) ________.

Answers

Answer:

Object

Explanation:

An item that contains both data and the procedures that read and manipulate it is called an object.

The organization will most likely ___ to an internal user attempting to escalate privilege than to an external hacker

Answers

Answer:

respond differently.

Explanation:

NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.

The NIST SP 800 30 is a risk mitigation framework that provide guidance for conducting or allows scope for research, assessment and acknowledgement for risk mitigation of federal information systems and organizations.

Typically, NIST SP 800 30 is used for translating cyber risk so that it can easily be understood by the chief executive officer (CEO) and board of both a public and private organization.

An organization is expected to most likely respond differently to an internal user such as one of its employees that attempt to escalate his or privilege than to an external hacker.

This is usually so because the organization trust its internal users to an extent than it does with external users or an attacker such as an external hacker.

Software written to meet the specific needs of a company is known as



Answers

Answer: system

Explanation:

System software refers to the software that's written to meet the specif needs of a company. It is designed in order to provide a platform for the other software and run the hardware and the application programs of a computer.

Examples of system software are game engines, industrial automation, search engines, etc.

The core difference between phishing and spear-phishing is: a. spear-phishing has more specific targets than phishing b. phishing attacks via email, spear-phishing attacks via infected webpages c. phishing attacks via email, spear-phishing attacks via social media d. phishing is an outside attack; spear-phishing is an internal security check e. anti-virus software prevents phishing but not spear-phishing

Answers

Answer:

a. spear-phishing has more specific targets than phishing

Explanation:

The difference between phishing and spear-phishing basically lies in the target. Phishing is a form of malicious software sent to a large number of people, probably through their e-mails, with the hope that a small percentage will fall victim to the attack.

Spear-phishing, on the other hand, is targeted at just one person. The person and his itinerary are studied and a message is designed to apply to that person and elicit his interest. Clicking on the message or link exposes the person's device to attack and unauthorized information might be obtained or malware is installed.

A company has a website that has seen a large increase in visitors and they are concerned that if the trend continues, the web server's performance will be compromised. You have been asked to help solve this problem without having to replace the current server. What can you do

Answers

Answer:

Install a second server and load balancer

Explanation:

Considering the scenario described above and to solve this problem without having to replace the current server, what I will do is to carry out "installation of a second server to provide additional capacity for the server and install load balancer which helps in managing and allotting incoming requests or application traffic to any ready server prepared of fulfilling them.

Robyn needs to ensure that a command she frequently uses is added to the Quick Access toolbar. This command is not found in the available options under the More button for the Quick Access toolbar. What should Robyn do?

Answers

Answer:

Access Quick Access commands using the More button.

Explanation:

To ensure that a command she frequently uses is added to the Quick Access toolbar Robyn would need to "Access Quick Access commands using the More button."

To do this, Robyn would take the following steps:

1. Go / Click the "Customize the Quick Access Toolbar."

2. Then, from the available options, he would click on "More Commands."

3. From the "More Commands" list, click on "Commands Not in the Ribbon."

4. Check the desired command in the list, and then click the "Add" button.

5. In the case "Commands Not in the Ribbon" list, did not work out Robyn should select the "All commands."

If you set the Decimal Places property to 0 for a Price field, and then enter 750.25 in the field, what does Access display in the datasheet

Answers

Answer:

The answer is "750".

Explanation:

Throughout this question the even though it used to provides the precise decimal which is used as the representation or rounding requirement in software such as billing, it also used to represents only the 750, demonstrating the nearest rounding of the given technique, that's why the solution is 750.

A) What is the initial configuration BPDU for B4? B) What is the configuration BPDU of B3 after receiving the initial configuration BPDU of B5? C) If B3 accepted B2 as the root, what is the configuration BPDU of B3? D) If B2 accepted B1 as the root through B7, what is the configuration BPDU of B2? E) Which bridge is the designated bridge of LAN C at this time? F) Now, if B5 accepted B1 as the root, what is the configuration BPDU of B3 after receiving the new configuration BPDU of B5? G) Which bridge is the designated bridge of LAN C at this time?

Answers

Answer: b is good

Explanation:

disadvantages of computer. ​

Answers

Answer:You cant carry it around like a phone

Explanation:

You're the administrator for a large bottling company. At the end of each month, you routinely view all logs and look for discrepancies. This month, your email system error reports a large number of unsuccessful attempts to log on. Its apparent that the mail server is being targeted. Which type of attack is most likely occurring

Answers

Answer:

It seems as though it would be a DDoS attack.

Explanation:

The characteristics are as follows:

A slow down of operations and attempting to get access into said service.

plz help me to do 4 number

Answers

Answer:

A is an abbaccus.  B is Blaze Pascal.  C is The Jacquard Loom.  D is Charles Babbage.  E is The Manchester Baby.

Explanation:

en que consiste excel

Answers

Answer:

Microsoft Excel es un programa para calcular y simplificar las tareas de administración de datos que forma parte del paquete Microsoft Office de Microsoft Corporation. Microsoft Excel tiene funciones básicas que se pueden usar para trabajar con hojas de cálculo, usando una cuadrícula que consta de celdas. Las funciones también están disponibles para mostrar gráficos y datos visuales similares.

Your friend want to make a copy of your new game you bought the previous day .

Why should you prevent him from doing that?​

Answers

Answer:

It is copyright infringement

Explanation:

Required

Why you should prevent your friend from copying a software you bought

When you purchase a software, you claim ownership of the software (for using the software on your devices); however, your ownership is not a full ownership because the software is an intellectual property of the developer.

This means that, you cannot copy or redistribute the software without the consent of the developer. Doing so, without getting consent, is a copyright infringement.

Question 1:
The Wayfinder is an ancient piece of technology created as a means of navigating challenging stretches of space. The device connects to every piece of technology in the galaxy in order to detect planets and spaceships and then shown their location to the user. As it happens, locations of planets follow a specific distribution. A planet can exist at coordinates x,y only if
2x² + |2xy| + y² =10000
The user can use the Wayfinder to find nearby planets by input the range for x and y. Draw a flowchart and write a C++ program that models the Wayfinder. Ask the user to input a range for x and y, then print all possible planet coordinates. The program should also print the number of planets detected.
Hint: you can use pow(x,n) to get the value of xn and abs(x) to get the absolute value of x.

helpppppppppp!!!!!!!!!!

Sample output:

Answers

Answer:

Following are the code to the given question:

#include<iostream>//header file

#include<math.h>//header file

using namespace std;

int main()//main method

{

   long long x, x1, y, y1;//defining long variable

   int count=0,i,j;//defining integer variable

   cout<<"Enter a range for x coordinates: "<<endl;//print message        

   cin>>x>>x1;//input x and x1 value                          

   cout<<"Enter a range for y coordinates: "<<endl;//print message

   cin>>y>>y1; //input y and y1 value  

   for(i = x; i <= -x1; i++)//use nested loop that tests each coordinates                                        

   {

       for(j = y; j <= y1; j++)//use nested loop that tests each coordinates

       {

           if(((2*pow(i,2)) + abs(2*i*j) + pow(j,2)) == 10000)//use if that checks condition as per the given question

           {

               cout<<"There is a planet at "<<i<<", "<<j<<endl;//  print coordinates

               count++;//incrementing count variable value                                                    

           }

       }

   }

   cout<<"Total number of planets detected are: "<<count<<endl;//print count value

   return 0;

}

Explanation:

In this code, inside the main method long "x, x1, y, and y1" and integer "count, i, and j" type variable is declared that uses a long variable to input value from the user-end.

In the next step, two nested loops have defined that test each coordinate and define if block that checks condition as per the given question and use i, j, and count variable to print value with the message.

hubs hardware advantage's and disadvantages​

Answers

Answer:

answer in picture

hope it's helpful

………………….... controls the operations like reading data from input devices, transmitting information to output devices and checking the components of a computer.​

Answers

Explanation:

hi the IP address of my colleague of mine that

When a collection of honeypots connects several honeypot systems on a subnet, it may be called a(n) honeynet

Answers

Answer:

The given statement is true.

Explanation:

The honeynet is indeed a decoy network comprising a honey trap or even more. It appears to be a real network with multiple systems but is housed on one or a few servers, each of them together in one setting, which is why it is termed a honeynet when more than one honeypot is linked to an amount of honey pot system on one subnet. In the IDSs (Intrusion Detection Systems), a padded cell system has been used which is like a honeycomb.

outline the steps involved in changing the colour of a theme ​

Answers

Answer:

Right click on the desktop and click on personalize option and then click on window color. After that window color and appearance window appears. select a color scheme you want. Go to Appearance and personalization, click on theme and select any theme from the list and click on ok.

Choose all that apply: You are servicing a Dell Inspiron 22 3265/3263 AIO Desktop and determine that the LCD panel is faulty. What troubleshooting steps will you follow before replacing the LCD Assembly

Answers

Explanation:

1.) Run ePSA, but press ESC to stop testing and regain control of the cursor. Double tap on the screen and see if the cursor moves to your pressed location. That will determine if the hardware is needed to be replaced or it is a software problem

2.) If the system boots into windows, check the device manager for the USB Input device which has a white circle and a down arrow, right click and enable it to test its functionality.

The troubleshooting steps that the user will need to follow before the LCD Assembly is replaced goes thus:

One will have to run the ePSA.The cursor will have to be regained by press esc in order to stop the testing.Then one will have to double tap the screen in order to check whether the cursor had been moved to the pressed location.The above is necessary in order to know if there will be a replacement of the hardware or whether it is a software problem Then if the system boots into windows, one will have to check the device manager in order to find the USB Input device which will then be right clicked to test its functionality.

In conclusion, the above method will be used for the troubleshooting.

Read related link on:

https://brainly.com/question/18275236

With a(n) ______, a search engine will show ads that have the keyword typed exactly as the searcher used, but may also have other words within the search. Group of answer choices exact match phrase match broad match modified broad match

Answers

Answer:

modified broad match.

Explanation:

A Search engine is an internet resource or service that searches for keywords or categories specified by the end user and then displays (shows) a list of website which matches or have informations similar to the query. Some examples of popular search engines are Goo-gle, Bing, Yahoo, etc.

At the retrieving stage of a web search, the search engine queries its database using a retrieval algorithm to extract the necessary and related terms to the search. After obtaining the search terms, the stored web addresses that are related to the search is then displayed.

There are different types of matching techniques used in configuring a search engine and these includes;

I. Exact match.

II. Phrase match.

III. Broad match.

IV. Modified broad match

When a modified broad match is used, the search engine shows adverts that have the keyword typed exactly as the searcher used, but may also include other words within the search term.

Hence, the name modified because it avail users other options by including other words within the search.

define business systems​

Answers

A business system is a group of interdependent elements or tasks that meet a business objective. You should document every step for each business process or activity. Business activities consistently produce results. Strategizing how you complete these tasks can help streamline daily operations.
Other Questions
Solve for y.5y 10 = 10y = [?]What is y? During intense exercise, the muscle cells require constant supply of ATPs but the supply of oxygen is low. In that case - the muscle cells of the person will switch from which to which pathway? correlation ship between health education,&home science long question???????? Where does the first stage of cellular respiration occur?Use this diagram of an animal cell to answer thequestionOWOXOYOZ Which of the following describes point D? Find the distance between each pair of points whose coordinates are given. Round to the nearest tenth if necessary. what is f(2)=this thing had to be atleast 20 When 50% of a number is added to the number, the results is 165 list the importance of energy? If the quadratic formula is used to find the solution set of 3x + 4x-2 = 0, what are the solutions? Which technological advancement from classical Greece is still used today? A motorist drove home from work late one night, and fell asleep behind the wheel of his car. His car drifted across the middle of the road and struck another car. The other driver was killed instantly in the collision. Angered by the noise of the collision, a homeowner fired a gun out the window of his house at the car. The bullet struck and killed a bystander. Both the motorist and the homeowner were arrested and charged with common law murder.Which of the defendants likely would be found guilty?A. Both the motorist and the homeowner.B. The motorist.C. Neither the motorist nor the homeowner.D. The homeowner. Geological evidence indicates there was once a warm tropical climate in what is now New York State. Other evidence shows that millions of years later, huge ice sheets covered the state. Which of the following statements can be concluded from the information above? (1) Climates of the future will always be as they are today. (2) The size and shape of the oceans remain constant through time. (3) Glaciers are limited to the polar regions. (4) There have been considerable climatic fluctuations in the past. (5) An ice age always follows a period of tropical climatic conditions. 5Attempt 1v Next Up: Submit AssignmentHEMATOLOGY1. ROOT ....2. COMBINING FORM3. SUFFIX...TRANSGASTRIC1. PREFIX....2. ROOT...3. SUFFIX...ARTHRITIS1. ROOT.......2. SUFFIX.... BEFORE, THE '' ERRE '' WAS CONSIDERED A LETTER OF THE SPANISH '' ABECEDARIO ''''TRUE''OR''FAKE'' We are testing a new drug with potentially dangerous side effects to see if it is significantly better than the drug currently in use. If it is found to be more effective, it will be prescribed to millions of people. 1. a. What does it mean in context to make a type I error in this situation? b. What does it mean in context to make a type Il error in this situation? c. Which error do you think is worse? Now we are testing to see whether taking a vitamin supplement each day has significant health benefits. There are no (known) harmful side effects of the supplement. 2. a. What does it mean in context to make a type I error in this situation? b. What does it mean in context to make a type Il error in this situation? c. Which error do you think is worse? For a given situation, what should you do if you think that committing a type l error is much worse than committing a type Il error? A. Increase the significance level. B. Decrease the significance level. C. Nothing, just be careful to take a good sample. he time between arrivals of small aircraft at a county airport is exponentially distributed with a mean of one hour. Round the answers to 3 decimal places. (a) What is the probability that more than three aircraft arrive within an hour? Enter your answer in accordance to the item a) of the question statement (b) If 30 separate one-hour intervals are chosen, what is the probability that no interval contains more than three arrivals? Enter your answer in accordance to the item b) of the question statement Find the perimeter of a rectangular tile with length 1/5ft and width 3/14ft Write down the ideology of your religion? Divide: (2n3+4n9)(n+2).