1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arlecino [84]
4 years ago
10

Your boss calls you from the road she's trying to connect to the local hotel guest wireless network but there's a yellow shield

displayed beside that particular wireless selection she's asking you what the shield means what do you tell her
Computers and Technology
1 answer:
tino4ka555 [31]4 years ago
6 0

Hiya!

If there is a yellow shield next to the wireless icon, this indicates that the connection is functioning but is not secured. In this case because she's using the hotel guest wifi, I would tell her to switch to a more secure network or to disregard the error.

Hope this helps!

You might be interested in
What level of access can a subapplication owner provide to another egrants user in the same organization who has been authorized
Oduvanchick [21]

The view/print privileges is the level of access can a subapplication owner provide to another egrants user in the same organization who has been authorized view/print access for other subapplications.

<h3>What is a Subapplicant?</h3>

Subapplicant is known to be a term that connote a State agency, or a community, that is said to be submitting a subapplication to the applicant and this is one that is often used as a source of aid under the FMA program.

Note that Upon grant award, the subapplicant is seen as the subrecipient and thus, The view/print privileges is the level of access can a subapplication owner provide to another egrants user in the same organization who has been authorized view/print access for other subapplications.

Learn more about subapplication from

brainly.com/question/14400492

#SPJ1

8 0
2 years ago
Does ripping a dvd erase the original content
kap26 [50]
No, ripping is the process of reading all content in order to make a copy. Nothing is erased.
7 0
3 years ago
To a traditional computer, one means
blagie [28]

a.on , off

In most computer processors, electron movement is controlled by tiny switches that turn this flow of electricity on and off...zero represents off and one represents on

4 0
4 years ago
Use propositional logic to prove the following argument is valid. If Alice gets the office position and works hard, then she wil
mrs_skeptik [129]

This question relates to Propositional logic. Thus, the propositions as defined are:

A = Gets office position

B = Works hard

C = Gets a bonus

D = Go on a trip.

<h3>What is the logical argument?</h3>

The logical argument is notated as follows:

((A∧B)→C)∧(C→D)∧(¬D),∴((¬A)∨(¬B))

<h3>What is a propositional logic?</h3>

A proposition is an assertion that can only be one of two things: valid or wrong. It can never be both.

Learn more about propositional logic at;
brainly.com/question/16783205
#SPJ1

8 0
2 years ago
How to write pseudo code that compute net salary = basic salary + transport + medical + housing - deduction​
igomit [66]

Answer:

Begin (Program Start)

Ask for BASIC SALARY from user!

Get BASIC SALARY.

Ask for TRANSPORT (FEE) from user!

Get TRANSPORT (FEE) .

Ask for MEDICAL (FEE) from user!

Get MEDICAL (FEE) .

Ask for HOUSING (FEE) from user!

Get HOUSING (FEE) .

Ask for DEDUCTION from user!

Get DEDUCTION.

NET SALARY = basic salary + transport + medical + housing - deduction

Calculate NET SALARY and DISPLAY it to the user.

End

6 0
3 years ago
Other questions:
  • Your friend, Isabella, is having difficulties remembering the names of different buttons on the Ribbon. Which of the following f
    6·1 answer
  • What naming scheme identifies the rows in a worksheet?
    15·1 answer
  • A large flowing network of streams and rivers moving across a land area is a ______________________.
    15·1 answer
  • a password to a certain database consists of digits that cannot be repeated. if the password is known to consist of at least 8 d
    14·1 answer
  • Example of a question that could NOT be answered with a binary message
    10·2 answers
  • Who are the four main antagonists in fnaf 1
    13·2 answers
  • SHOW ALL YOUR WORK. REMEMBER THAT PROGRAM SEGMENTS ARE TO BE WRITTEN IN JAVA.
    13·1 answer
  • Sensitive data is always classified true or false
    14·1 answer
  • What stage of the development process is often called the pre-alpha phase and is the "meat" of the design process where features
    5·1 answer
  • Which situations are most likey to use Telehealth
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!