1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aksik [14]
3 years ago
10

One of the ways attackers can access unencrypted data being transmitted on your network is by

Computers and Technology
1 answer:
nikdorinn [45]3 years ago
5 0
<span>One of the ways attackers can access unencrypted data being transmitted on your network is by </span>collecting electronic emissions that come from your networking closet or Ethernet cables. 
You might be interested in
What is the most recognized and widely used database of published nursing practice literature?
faust18 [17]
That would be the <span>Cumalitive Index to Nursing and Allied Health Literature.</span>
7 0
3 years ago
Select the correct answer.
DochEvi [55]

Answer:

ask customers to use strong passwords to protect their accounts

6 0
3 years ago
Read 2 more answers
N a MenuStrip, if you create each main menu item with a(n) ____ in front of a unique letter, then the user can press Alt and the
Zolol [24]

Answer:

C) &

Explanation:

In the C# programming language a MenuStrip adds a custom menu bar to the program that you are making in which you can create unique menu items. When doing so, if you create a menu item with an & in front of a unique letter, the user can press ALT and the letter to activate the menu choice. These shortcuts are known as Access Keys.

8 0
4 years ago
Given an array of values which initially contains 9 8 7 6 5 4 3 2 1, what does the array look like after bubble sort has execute
Phantasy [73]

Answer:

//Here is code in C++.

//include header

#include <bits/stdc++.h>

using namespace std;

// function to print the array

void out_arr(int inp[], int len)

{

for (int i = 0; i < len; i++)

 cout << inp[i] << " ";

cout << endl;

}

// main function

int main()

{

   // decalare and initialize the array

int inp[] = {9,8,7,6,5,4,3,2,1};

//find the length of array

int len = sizeof(inp)/sizeof(inp[0]);

int x, y;

// perform bubble sort, only 3 pass

for (x = 0; x < 3; x++)  

{

for (y= 0; y< len-x-1; y++)

 if (inp[y] > inp[y+1])

 {

  int t=inp[y];

  inp[y]=inp[y+1];

  inp[y+1]=t;

 }

 

 cout<<"array after "<<x+1<<" pass"<<endl;

 // print the array after every pass

     out_arr(inp, len);

}

return 0;

}

Explanation:

Declare an integer array "inp" and initialize with {9,8,7,6,5,4,3,2,1}. Find the length of the array.In first pass of bubble sort, largest value is placed at the correct position in the array. And in the second, second largest value is placed at its correct position. After the n pass, array will be sorted. In each pass, each element is compared with the next element. if the value is greater than swap them. This continues for all elements in each pass. In the end of a pass a value is placed correctly. So if there is only 3 pass then 3 largest values will be placed at their right place.

Output:

8 7 6 5 4 3 2 1 9                                                                                                              

array after 2 pass                                                                                                            

7 6 5 4 3 2 1 8 9                                                                                                              

array after 3 pass                                                                                                            

6 5 4 3 2 1 7 8 9

7 0
3 years ago
Select the correct text in the passage.
Rasek [7]

Answer: To charge his camera, he uses any available charge

Explanation: This is the answer as having a charge ready at any time can be helpful.

5 0
2 years ago
Other questions:
  • Gina is upgrading your computer with a new processor. She installs the processor into your motherboard and adds the cooling syst
    5·2 answers
  • The technology that identifies people through bodily characteristics is known as
    10·1 answer
  • When using powershell, an administrator can use the ____________ cmdlet to create a new dc in a new forest.??
    14·1 answer
  • ________________ is a new method or idea or product or enhancement or other means of adding value to an existing product, such t
    14·1 answer
  • Which is a requirement for searching for a template
    14·1 answer
  • The presentation ____ determines the formatting characteristics of fonts and colors.
    8·1 answer
  • Explain why the cosmic horizon is much smaller than the universe itself
    9·1 answer
  • Difference between primary key and foreign key
    12·1 answer
  • What does the image depict:
    14·1 answer
  • Someone please help me
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!