1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
antiseptic1488 [7]
3 years ago
10

Infrared, a wireless connection used in the past prior to bluetooth, was limited because it ________.

Computers and Technology
1 answer:
Mars2501 [29]3 years ago
8 0
It required a direct line of site between devices. Hope this helps!
You might be interested in
A common hardware component found in electronic devices including desktop computers, laptops, tablets and smartphones. The amoun
Maurinko [17]

Answer:

A. RAM

Explanation:

RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data in current use are kept so they can be quickly reached by the device's processor.

8 0
3 years ago
You can use predesigned, formatted files called _____ to create new worksheets quickly.
Leokris [45]
You can use predesigned, formatted files called -templates- to create new worksheets quickly.
8 0
3 years ago
A _______ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user
sergeinik [125]
<h2>A <u>Rogue attack</u> utilizes software just to attempt hundreds of frequent phrases in a row.</h2>

  • Rogue access equipment would be any WLAN radio channel that isn't even authorized to communicate or join the corporate connection.
  • Whenever they have been misconfigured as well as set up without authentication, it creates a new security vulnerability potentially gaining simple access to a private network.

Thus the response above is correct.

Learn more about software attacks here:

brainly.com/question/25407509

7 0
3 years ago
Read 2 more answers
Create a 4x5 matrix with ones everywhere and zeros on the last row.
Stells [14]

Answer:

#include <iostream>

using namespace std;

int main() {

   int a[4][5];//declaring a matrix of 4 rows and 5 columns.

   for(int i=0;i<4;i++)

   {

       for(int j=0;j<5;j++)

       {

           if(i==3)//initializing last row as 0.

           {

               a[i][j]=0;

           }

           else//initializing last row as 1.

           {

               a[i][j]=1;

           }

       }

   }

   for(int i=0;i<4;i++)

   {

       for(int j=0;j<5;j++)

       cout<<a[i][j]<<" ";//printing the matrix.

       cout<<endl;

   }

return 0;

}

Output:-

1 1 1 1 1  

1 1 1 1 1  

1 1 1 1 1  

0 0 0 0 0

Explanation:

I have created a matrix of size 4 rows and 5 columns.I have used for loops to fill the array.To fill the last row with 0 i have used if statement.else we are filling it with 1.

7 0
3 years ago
Suppose you are given a text file. Design a Python3 program to encrypt/decrypt that text file as follows:
Allushta [10]

Answer:

Explanation:

Please find attachment for the Python program

Download docx
7 0
3 years ago
Other questions:
  • Find the 65th percentile from the data. The data consist of class interval from 0-10, 10-20, 20-30, 30-40, 40-50, 50-60 and freq
    8·1 answer
  • "PindCart, an online retailer, places a small file on the computer hard drive of its visitors to recognize them when they revisi
    7·1 answer
  • 1. The global economy involves trading between people from different _____
    8·1 answer
  • A palindrome is a string that reads the same both forward and backward. For example, the string madam is a palindrome. Write a p
    13·1 answer
  • Which element appears within the top margin of the document but does not form the part of the body of the text?
    15·1 answer
  • 2.8 Code Practice: Question 2
    11·1 answer
  • 1. What are you going to do if someone ask for your personal information online?​
    12·2 answers
  • Program Convert Measurements:
    15·1 answer
  • How do we Rewrite the following Python code to avoid error. mark=inpt("enter your mark ")
    6·1 answer
  • How many ways are used to insert an image from file?koi h kya​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!