1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Varvara68 [4.7K]
3 years ago
11

________ is a wireless protocol designed for transmitting data over short distances, replacing cables. ipv6 ipv4 paas bluetooth

Computers and Technology
1 answer:
KIM [24]3 years ago
3 0
Wifi is a wireless protocol designed
You might be interested in
Derek, a project manager. is involved in an activity that occurs during the system-level requirements analysis. In which activit
Vilka [71]

Derek is involved in the option C.) work breakdown structure activity of providing insights about the design.

<h3>What is work breakdown structure?</h3>

A Work Breakdown Structure (WBS) is known to be a kind of an hierarchical outline  or division of the tasks that is known to be needed to complete a  given project.

Note that the WBS “breaks down” is seen as the structuring of any given  project into a way that is said to be manageable in its deliverables.

Note also that the deliverable is sent on a task and as such, Derek is involved in the option C.) work breakdown structure activity of providing insights about the design.

Learn more about work breakdown structure from

brainly.com/question/6197566
#SPJ1

Derek, a project manager, needs to create a plan for a software development project. Which approach or document will help him define the tasks required to carry out that project?

A.) tracking application

B.) tracksheet

C.) work breakdown structure

D.) project application

8 0
2 years ago
What controls can be found on the File tab of Microsoft PowerPoint? Check all that apply. Help Print Track Open Insert Save
Sophie [7]

Answer:

Help

Print

Open

Save

Explanation:

5 0
2 years ago
Complete the function to return the result of the conversiondef convert_distance(miles):km = miles * 1.6 # approximately 1.6 km
AnnZ [28]

Answer:

The complete program is as follows:

def convert_distance(miles):

   km = miles * 1.6 # approximately 1.6 km in 1 mile

   return km

my_trip_miles = 55

# 2) Convert my_trip_miles to kilometers by calling the function above

my_trip_km =convert_distance(my_trip_miles) #3) Fill in the blank to print the result of the conversion

# 4) Calculate the round-trip in kilometers by doubling the result,

print("The distance in kilometers is " +str(my_trip_km))

# and fill in the blank to print the result

print("The round-trip in kilometers is " + str(my_trip_km * 2))

Explanation:

<em>The program is self-explanatory because I used the same comments in the original question.</em>

5 0
3 years ago
To keep you from inadvertently moving controls as you work in the IDE, click the form or control, then click the _________ optio
Delicious77 [7]

Answer:

Lock Control

Explanation:

Lock Control can used to keep you from inadvertently moving controls while working in the IDE.You can do that by  clicking on the form and then click Lock control in format menu.

In visual studio you have to go to properties and and select Locked property and select True.So that it can be locked and you can unlock them also from here.

5 0
4 years ago
Which of the following best describes a hacktivist? Select one: a. An individual who attempts to destroy the infrastructure comp
brilliants [131]

Answer: (B) An individual who hacks computers or Web sites in an attempt to promote a political ideology

Explanation:

 Hacktivist is the defined as an individual that basically hacks the various types of web sites and computer system for promoting the various political ideologies. The hacktivists is the method which include the DDOS attacks (Distributed denial of services).

It basically causes various website and the email with the congestion of traffic with the computer virus and by the data stealing. The denial of services attacks typically considered federal crime and illegal in united state.  

4 0
4 years ago
Other questions:
  • The process of converting information, such as text, numbers, photos, or music, into digital data that can be manipulated by ele
    7·1 answer
  • How do you subscribe to Darthmaul Productions on YT?
    13·1 answer
  • why is this message poor or ineffective ,Due to low profits,there will be no annual year-end bonus this year. We hope to have a
    13·2 answers
  • All of the following are aspects of the search process except?
    5·2 answers
  • The two parts of a packet are the certificate and the While storms could be a cause, power _________ are more likely to be cause
    11·1 answer
  • The data type that can hold decimal or fractional values
    14·1 answer
  • Does the colour intesity change of the liquid if you add more baking soda?​
    6·1 answer
  • Which symbol shows an input?
    13·1 answer
  • Define a function OutputValues() that takes two integer parameters and outputs all integers between the first and the second par
    15·1 answer
  • Which of these is an example of an online workspace?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!