1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vagabundo [1.1K]
3 years ago
5

you are configuring a wireless connection on your home router. Because you live in an apartment complex, the level of security i

s paramount. which of the following wireless options is the most secure​
Computers and Technology
1 answer:
REY [17]3 years ago
4 0

The question has the following answers attached

SSID

WEP

WPA

WPA2

Answer is WPA2

WEP is weak and remains highly vulnerable and is hardly used. There are simple and readily available tools that can be used to hack WEP encryption. If you have a choice to make between WPA and WPA2, I would suggest you choose WPA2 over its predecessor WPA. Both encryption methods support secure wireless internet networks from unauthorized access but WPA2 offers more protection. WPA2 uses more advanced and stronger encryption keys and support maximum protection for your connection.

You might be interested in
A.
blondinia [14]

Answer:

the electronic devices that are used for storing and processing data typically in binary from according to instructions given to it in a variable program . its major parts are 1 keyboard. mouse .monitor. cpu

Explanation:

i think this one is of a number

7 0
3 years ago
Write a function that takes, as an argument, a list, identified by the variable aList. If the list only contains elements contai
Genrish500 [490]

Answer:

The function is as follows:

def concList(aList):

   retList = ""

   for i in aList:

       if(str(i).isdigit()):

           retList+=str(i)

       else:

           retList = "Not digits"

           break;

   return retList

Explanation:

This defines the function

def concList(aList):

This initializes the return string to an empty string

   retList = ""

This iterates through aList

   for i in aList:

This converts each element of the list to an empty list and checks if the string is digit

       if(str(i).isdigit()):

If yes, the element is concatenated

           retList+=str(i)

If otherwise

       else:

The return string is set to "No digits"

           retList = "Not digits"

And the loop is exited

           break;

This returns the return string

   return retList

5 0
4 years ago
Define knowledge management
abruzzese [7]
Knowledge management is the process of creating, sharing, using and managing the knowledge and information of an organisation. It refers to a multidisciplinary approach to achieving organisational objectives by making the best use of knowledge.
4 0
3 years ago
Which of the following is computer memory that works while the computer is turned on?
Crazy boy [7]

Answer:

Ron is the answer

Explanation:

In that sense it is similar to secondary memory, which is used for long term storage. When a computer is turned on, the CPU can begin reading information stored in ROM without the need for drivers or other complex software to help it communicate.

5 0
3 years ago
Helpppppppppppppp me pl;s
Natasha_Volkova [10]

Answer:

Option C or 3

Explanation:

solar panels can only produce energy when the sun is shining because all of the energy it produces is stored in a battery which then you use during the dark hours of the day. You also need to maintain the cleanliness of the panels because if they get dusty they will not produce as much energy.

8 0
3 years ago
Other questions:
  • In java, c or c++ code, when a number begins with a leading 0, what do you know about that number: (example: int zzz = 012;) in
    13·1 answer
  • Consider the following two implementations of the same algorithm, each written in a different language.
    11·1 answer
  • Type of media that uses laser technology to store data and programs is
    6·1 answer
  • Analytical processing uses multi-levelaggregates, instead of record level access.? True? False
    12·1 answer
  • How to import any csv from internet in phyton 3 and R ?
    12·1 answer
  • Thetremendous diversity of the source systems is the primary reasonfor their complexity. Do you agree
    6·1 answer
  • What finger is used to key letter c
    12·2 answers
  • Mintzberg's classification of organizational structure categorizes the knowledge-based organization where goods and services dep
    5·1 answer
  • Computer software that brings together sound, video, graphics, animation, and text and adjusts content on the basis of user resp
    7·1 answer
  • Fill in the blacks
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!