1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kap26 [50]
3 years ago
10

Word processing software allows users to do which of the following:

Computers and Technology
1 answer:
creativ13 [48]3 years ago
5 0
There are no options
You might be interested in
7.1 What is the basic building block of an 802.11 WLAN? 7.2 Define an extended service set. 7.3 List and briefly define IEEE 802
Black_prince [1.1K]

Answer:

7.1)

BSS (Basic Service Set) is a basic building block of  802.11 wireless LAN.

It is the wireless station that executing the similar competing and the MAC protocol for accessing a similar wireless system is shared.

7.2)

The Extended Service Set is one of the basic components of IEEE 802.11 WLAN architecture which increases the mobility range to the individual BSS (Basic Service Set).

An ESS is the set that contains two or more than two Basic Service Sets

that forms an individual sub-network.

7.3)

The IEEE 802.11 service has the MAC layer implement which falls in two categories:

  1. Service Station.
  2. Distribution System Service.

Service Station - 802.11 standard has defined the services which is providing the functions among the stations.

It includes the following components:

  • Authentication
  • Deauthentication
  • Privacy
  • MSDU delivery.

Distribution System Service - It defined by the 802.11, provides the functionality across the distribution system and access point also provides the DSS.

It includes the following components:

  • Association  
  • Disassociation  
  • Distribution  
  • Integration  
  • Reassociation.

7.4)

It either may be or either not be a wireless network.  

Because distribution system has these three things:

  • Wired network
  • Wireless network
  • A switch

7.5)

Association agrees on the set security capabilities to use.

It also allows the mobile node which has made the transition to identifies itself to the AP (Access Point) within a BSS so that's why the nodes can be participated in the data exchanges with  another mobile nodes.

7.6)

The IEEE 802.11i are addresses the three types of security areas:

1) authentication,

2) key management,

3) data transfer privacy.

7.7)

7 0
3 years ago
Which of the following is an example of synchronous communication?
kirza4 [7]

The answer is D) on Oddessey Ware

4 0
3 years ago
When doing a complex presentation, which of the following would be the best tool to begin designing your presentation?
Dafna1 [17]
An outline can be a best tool to begin describes a presentation....
4 0
4 years ago
Read 2 more answers
Case 2-2 Jack has a computer at home that he uses to access the Internet, store and edit personal photos, and create and edit do
bekas [8.4K]

Answer:

Check button under error checking

Explanation:

Under the Tools tab there are two options:

Error checking and Optimize and defragment drive option.

clicking the check button with administrative permission under error checking option will examine the hard drive for errors.

3 0
3 years ago
How do you add a section break that would start the new section on the same page?
Maksim231197 [3]
Leave a line and that will make a section break
8 0
4 years ago
Read 2 more answers
Other questions:
  • In order for an IT security framework to meet information assurance needs, the framework needs to include policies for several a
    13·1 answer
  • What factor(s) should be considered when determining whether a business is too far based on the query and the user location? Sel
    14·1 answer
  • What Are Some Tips To Pass (Cisco ADVDESIGN) 352-001 Exam?
    12·1 answer
  • Rose opens her software application and gets a message stating that she has only 16 more uses of the product available. Given th
    15·1 answer
  • This uses the gps methodology to predict the likely location of an offender's base of operation:
    8·1 answer
  • A void function can return any value. TRUE FALSE
    8·1 answer
  • the following names are considered valid names for variable except for a. ST_Name b. ST name c. STName​
    9·1 answer
  • We want to use image processing to detect cats in images, how do you do it? Please write down the steps.
    9·1 answer
  • "Jan23" can be stored using which data type? O an alphanumeric string O a boolean operator o characters floating point numbers​
    13·2 answers
  • Why do digital media professionals create portfolios of their work?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!