1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Setler79 [48]
3 years ago
14

You tell pavel that he needs to set up a wi-fi network whose range will need to be about 350 feet. pavel tells you that you need

to use ____ devices.
Computers and Technology
1 answer:
Hunter-Best [27]3 years ago
6 0
The most serious security threat to Bluetooth-enabled devices is ____<span>, which occurs when a hacker gains access to the </span>device<span> and its functions without the owner's consent. 70. ... </span>Pavel tells you<span> that it's the </span>____<span> standard. a. ... </span>You tell Pavel<span> that </span>he needs<span> to </span>set up<span> a </span>Wi-Fi network whose range will need<span> to be about </span>350 feet<span>.</span>
You might be interested in
In a typical e-mail address, the "host" is user: which one of the following word processing features saves you the most time whe
gayaneshka [121]
Find-and-replace . hope this helps !
4 0
3 years ago
Mrs. Jackson wrote a newsletter to the customers of her housecleaning business that included some organizational tips they could
nika2105 [10]
The correct answer is a. effective communication

- - -
Ineffective and barriers to communication are problems that make communication unclear. Workplace communication is at work or at a job. This is not a job newsletter for workers, but for people at home.
5 0
4 years ago
Read 2 more answers
Natural language generation is focused on?
Mila [183]

While natural language understanding focuses on computer reading comprehension, natural language generation enables computers to write. NLG is the process of producing a human language text response based on some data input. This text can also be converted into a speech format through text-to-speech services.

<em>-</em><em> </em><em>BRAINLIEST</em><em> answerer</em>

6 0
3 years ago
In this lab, you write a while loop that uses a sentinel value to control a loop in a C++ program that has been provided. You al
SVETLANKA909090 [29]

Following are the C++ program to calculating the average value.

Program Explanation:

  • Defining header file.
  • Defining the main method.
  • Defining three double variable "numStars,averageStars, and totalStars", and one integer variable "numPatrons".
  • After declaring a variable, an input method is used that inputs an integer variable.
  • In the next step, a while loop is declared that uses an integer variable to the check value between 0 to 4.
  • Inside the loop, it adds the integer variable value and uses a conditional statement that checks integer value equal to 0, that hold 0 value into the "averageStars".
  • In the else block it calculates the average value and prints its value.

Program:

#include <iostream>//defining header file  

#include <string>//defining header file  

using namespace std;

int main()//main method

{

double numStars,averageStars,totalStars=0; // defining a double variable

int numPatrons = 0; //defining integer variable

cout << "Enter rating for featured movie: ";//print message

cin >> numStars;//input integer variable

while(numStars >= 0 && numStars<=4)//using while loop that use integer variable to check value in between 0 to 4

{

   numPatrons++; // increasing integer variable value

   totalStars += numStars; // using totalStars that adds numStars value in it

   cout << "Enter rating for featured movie: ";//print message

   cin >> numStars;//input double value

  }

if(numPatrons == 0)//using if block that check integer value equal to 0

      averageStars = 0;//holding value into averageStars

else//else block

      averageStars = totalStars/numPatrons;//calculating averageStars value

cout << "Average Star Value: " << averageStars << endl;//print message with averageStars value

return 0;

}

Output:

Please find the attached file.

Learn more:

brainly.com/question/16665413

3 0
3 years ago
A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for
yarga [219]

Answer:

implementing a firewall

installing antivirus software

Explanation:

implementing a firewall: implementing this you could prevent the inbound and outbound not permitted connections to your internal network.

installing antivirus software: We need to install a antivirus software in the endpoints to detect and delete possible infections.

8 0
4 years ago
Other questions:
  • The part of the computer that provides access too the internet is?
    10·2 answers
  • In 2–4 sentences, describe how you would center text.
    11·1 answer
  • When creating a password, users tend to use Select one: a. All capital letters b. Passwords that are too long c. Familiar phrase
    9·1 answer
  • How can I collect tweets from different accounts concurrently and categorize the tweets in a corpus?
    15·1 answer
  • Replace any alphabetic character with '_' in 2-character string passCode. Ex: If passCode is "9a", output is: 9_
    6·1 answer
  • Improvements in technology make the world seem larger to people.<br> a. True<br> b. False
    6·2 answers
  • Which software documentation guideline did the IEEE establish?
    10·1 answer
  • Create and configure databases in oracle database management system operation administration
    6·1 answer
  • Designing a mouse to fit well in your hand would demonstrate ..?
    14·2 answers
  • Select the correct text in the passage.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!