1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
I am Lyosha [343]
2 years ago
10

How can you protect your information when using wireless technology

Computers and Technology
1 answer:
Mnenie [13.5K]2 years ago
8 0

Answer: Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.

Explanation:

You might be interested in
Microsoft PowerPoint is popular software that allows you tocreate slides, handouts, notes, and outlines.
gtnhenbr [62]

Answer:

The statement is true. Microsoft PowerPoint is a popular software that allows you tocreate slides, handouts, notes, and outlines.

Explanation:

Microsoft PowerPoint is a presentation program developed by Microsoft for Windows, macOS and lately for Android and iOS operating systems. It comes integrated in the office package called Microsoft Office as one more element, which can take advantage of the advantages offered by the other components of the computer to obtain an optimal result.

It is a program designed to make presentations with schematized text, as well as slide shows, text animations and clip art or imported from computer images. Different font, template and animation designs can be applied. These types of presentations are usually more practical than those of Microsoft Word.

5 0
3 years ago
Difference between windows 2000 professional and service pack
Rudiy27
The difference between a Windows 2000 Professional and a Service Pack is a Windows 2000 Professional has a better running quality than the Windows 2000 Service Pack. 

Higher quality

better storage 

by better i mean BIGGER STORAGE

HOPE THIS HELPS
5 0
3 years ago
The list listOne is a sorted list of numbers that contains 700 elements. The list listTwo is a sorted list of numbers that conta
Flura [38]

Answer:

I am pretty sure the answer is A

Explanation:

3 0
3 years ago
In a large organization, how do you typically request permission to perform a network change?
kherson [118]

<em>Network change in larger organization follows hierarchy of approval. </em>

<em>Hierarchy of approval will start from the lowest department. The lowest department must prepare a written proposal, stating that there is a need for the network upgrade. Attachments such as proposed price list for the new equipments to buy also comes up with the proposal. Once that all documents are prepared, signatures from approval departments must be gathered. Each signature should be present and complete. </em>

<em> </em>

<em />

3 0
3 years ago
Which of the following cannot be copyrighted
denpristay [2]
1.I'm not sure.
<span>2. A story that you wrote based on a book you read
3. T</span><span>he website user (I think)</span>
4 0
4 years ago
Other questions:
  • List seven basic internal components found in a computer tower
    13·1 answer
  • In python:
    8·1 answer
  • Explain the usage of the keywordtransient?
    9·1 answer
  • How do u beat sonic unleashed
    8·1 answer
  • An ARP broadcast is sent to the special MAC address _______.
    9·1 answer
  • The Analysis phase of the SDLC examines the event or plan that initiates the process and specifies the objectives, constraints,
    10·1 answer
  • The GNU/Linux operating system comes with many built-in utilities for getting real work done. For example, imagine you had to an
    10·1 answer
  • What is the Purpose and function of the Global Positioning System (GPS)?
    7·1 answer
  • Can you move it like this? I can shake it like that
    6·1 answer
  • During slide show mode, hitting the B key will do which of these things? end your presentation move back one page move to the fi
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!