1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitry [639]
4 years ago
6

Can someone please help me with the three questions please?

Computers and Technology
1 answer:
fomenos4 years ago
5 0
1. D, all of the above counts as communication
2. C, Domain Name Server translates domains into IP addresses
3. B, MAC addresses are physicall addresses of network interfaces
You might be interested in
When engineers consider _____, they propose giving up a benefit of one proposed design in order to obtain a benefit of a differe
spin [16.1K]

Answer:

The answer is A. Constraint.

5 0
3 years ago
Which of the following hacker attacks against wireless networks are virtually undetectable?
Ede4ka [16]

Answer: A. passive attacks

Explanation:

Passive attack is a type of attack where by a system is tracked and scanned to determine how vulnerable it is and to also detect open port. The major purpose of a passive attack on a network is to gain access to the information of the target without altering the data.

A passive attack on a network may not be necessarily malicious, it is a type of network attack that is very difficult to detect.

Methods of carrying out passive attacks.

•War driving: scanning of networks is carried out to detect Wi-Fi that are vulnerable.

•Dumpster driving: Attackers or intruders search for information from discarded computers and

other gadgets, those information can help to attack a network.

7 0
4 years ago
Please, ignore
Komok [63]
Abhheoorioooooohhhhh omg
3 0
3 years ago
Read 2 more answers
If you have questions about taxes, where can you go to get answers?
Andrews [41]

Answer:

Explanation:

i was told to paste this to other comment sections sooo...HEY PLS DON'T JOIN THE ZOOM CALL OF A PERSON WHO'S ID IS 825 338 1513 (I'M NOT SAYING THE PASSWORD) HE IS A CHILD PREDATOR AND A PERV. HE HAS LOTS OF ACCOUNTS ON BRAINLY BUT HIS ZOOM NAME IS MYSTERIOUS MEN.. HE ASKS FOR GIRLS TO SHOW THEIR BODIES AND -------- PLEASE REPORT HIM IF YOU SEE A QUESTION LIKE THAT. WE NEED TO TAKE HIM DOWN!!! PLS COPY AND PASTE THIS TO OTHER COMMENT SECTIONS

4 0
3 years ago
Write a program that accepts three decimal numbers as input and outputs their sum​
Sophie [7]

Answer:

sum = 0.0

for i in range(0,3):

   sum += float(input("Enter a decimal number to sum: "))

print ("Sum: ", sum)

*** Sample Input ***

Enter a decimal number to sum: 1.1

Enter a decimal number to sum: 2.2

Enter a decimal number to sum: 3.3

*** Sample Output ***

Sum:  6.6

Explanation:

For this problem, a method was devised in python to create the sum of three individual decimal numbers.

The first line of code, <em>sum = 0.0</em>, initializes a variable to the float type in which we will store the value of our sum.  Note, it is initialized to 0.0 to start from a value of 0 and be considered a float.

The second line of code, <em>for i in range(0,3):</em>  is the creation of a for loop control structure.  This will allow us to repeat a process 3 amount of times using the iterator i, from value 0 to 3 in this case.  Note, 0 is inclusive and 3 is exclusive in the python range.  This means the for loop will iterate with, i=0, i=1, and i=2.

The third line of code, <em>sum += float(input("Enter a decimal number to sum: "))</em>  is simply asking the user for a number, taking that input and converting it from a string into a float, and then summing the value with the previous value of sum and saving that into sum.

The fourth line of code, <em>print ("Sum: ", sum)</em> is simply displaying the final value that was calculated by adding the three user inputs together which were stored into the variable <em>sum</em>.

Cheers.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Texture fills are available to add as a slide background true or false
    7·2 answers
  • Carol typed a memo to send to everyone in her department. To create this memo, she used a _____. spreadsheet word processor fax
    10·2 answers
  • An interpreter _______. converts the procedural language one statement at a time converts the source code into machine language
    12·1 answer
  • ________ are used to translate each source code instruction into the appropriate machine language instruction.
    11·1 answer
  • Choose two browsers and compare their security features.
    5·1 answer
  • adding ______around calculations indicates which calculations should be performed first before following the typical order of op
    6·1 answer
  • To answer the research question "How am I going to find the information I need on the tople?" the best thing Georgia should
    15·1 answer
  • What are the paparazzi?
    8·1 answer
  • Why would researching the average earnings by major and by career be useful to you as you choose an institute for higher educati
    10·1 answer
  • How to add a legend to a graph in excel?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!