1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arlecino [84]
4 years ago
10

Your boss calls you from the road she's trying to connect to the local hotel guest wireless network but there's a yellow shield

displayed beside that particular wireless selection she's asking you what the shield means what do you tell her
Computers and Technology
1 answer:
tino4ka555 [31]4 years ago
6 0

Hiya!

If there is a yellow shield next to the wireless icon, this indicates that the connection is functioning but is not secured. In this case because she's using the hotel guest wifi, I would tell her to switch to a more secure network or to disregard the error.

Hope this helps!

You might be interested in
How Java provides protection through stack inspection approach ?
Natalija [7]
Pecting Java<span> 2's </span>stack inspection<span> policy to be enforced can-. not execute on .... Figure 2. PSLang security policy that </span>allows<span> at most 10 open windows. .... </span>Method<span> call/return: A → B. At start of B, look up</span>protection<span> domain PB for B's. code and push PB on the thread-local domain-. </span>Stack<span>. At return from B (either normally or by.</span>
3 0
3 years ago
The association between a UCS and a CS can be extended to include more stimuli (more stimuli related to the CS can elicit the CR
almond37 [142]

Answer:

The answer is Stimulus generalization

Explanation:

Stimulus generalization is an example of classical condition. Classical conditioning takes a stimulus that does not cause a particular response (neutral stimulus) and then pairs it repeatedly with an unconditioned stimulus that will cause an unconditioned response. In the case of Stimulus generalization, I will give an example of a subject presenting food to a dog once they ring a bell. Lets say that you have taught a dog to salivate every time it hears a bell ring. If you took another bell that has a similar sound and rang it, the dog would still salivate and come pick its food. This is a perfect example of Stimulus generalization. The dog has responded to a new stimulus as if it was the initial conditioned stimulus.

5 0
3 years ago
A spreadsheet program is a computerized version of
MrRa [10]

Answer:

A spreadsheet program is a computerized version of paper accounting.

Explanation:

A spreadsheet program is a computerized version of a paper accounting worksheet where everyone can easily use the sheet according to their need. For example, a spreadsheet can be used as a data entry sheet, as arithmetic operations. Data entry in paper accounting was done manually with paper whereas spreadsheet has cells in it to record the entries. Similarly, other operations such as recording the data, performing analytical operations were part of old system and these are now used in spreadsheet as a basic function.  In short, the spreadsheet is a very friendly application where values can be analyzed, stored, and modified as per requirements. These all defined tasks are part of paper based accounting now done using computer program.

7 0
4 years ago
Read 2 more answers
What the repeal of online privacy protections means for you?
kvv77 [185]
Online Privacy is well, our privacy while on the internet. If they have repealed that, then we have no privacy while on the internet. I feel like now a days there is no privacy at all anywhere. Everywhere you go, there are cameras watching you. So for them to take away online privacy is pretty messed up.
7 0
4 years ago
A binary search algorithm is written (as in the modules, for example) which searches a pre-sorted array for some user-defined va
Mazyrski [523]

Answer:

c) it will always return with an answer of 7 or fewer comparisons of data.

Explanation:

As maximum number of comparison in worst case for sorted binary search is log₂n, here n = 100, so maximum search is at least 6.6 which is approximately 7.

4 0
3 years ago
Other questions:
  • The most effective way to perform data entry is to keep your hands on the keyboard and press to move to the text cell in the row
    10·1 answer
  • What block cipher mode of operation involves each ciphertext block being fed back into the encryption process to encrypt the nex
    12·1 answer
  • If you want to import text into a DTP application that was first created in a word processing program, what must you do?
    9·2 answers
  • You modify a document that is saved on your computer. Where are the changes stored until you save the document?a. Radom access m
    15·1 answer
  • Choose two browsers and compare their security features.
    5·1 answer
  • How do you merge on excel?​
    5·1 answer
  • He flow of electric charges through a material describes an electric _______.
    10·1 answer
  • Which of the following is NOT a factor of identifying graphic design?
    10·2 answers
  • Which one of the statements best characterizes the current state of e-commerce?
    15·1 answer
  • If there is a secure socket layer in place, what will you need in addition to a user id in order to access the shared files?.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!