1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leto [7]
3 years ago
15

Each time a user logs on locally, the ____ database is used to verify logon credentials. sam ssid sid nid

Computers and Technology
1 answer:
NNADVOKAT [17]3 years ago
6 0
<span><span>Each time the user logs on locally, the SSID database is used to verify logon credentials.

Service Set Identifier (SSID), which is attached to the headers of packets that are transmitted over Wireless Local Area Network or W-LAN is a unique identifier. It contains a total of 32 characters. The alphanumeric identifier is case sensitive.</span></span>
You might be interested in
Answer the following questions:
victus00 [196]

Answer:

The answer to the following questions can be given as:

Question: 1

value of foo is = 1020

Question: 2

Output of the code is = false

Question: 3

function add(a, b)

{

 return a && b ? a + b : function (c) { return a + c; };

}

var a=add(2,5);

var x=add(2)(5);

print(a);

print(x);

output:  

7

7

Question: 4

"goh angasal a m'i"

Question: 5

In this we check that if in the window a foo function exists. otherwise we set windows.foo to bar.

Question: 6

first alert shows the value "Hello World";

second alert shows value ReferenceError, In this bar not defined.

Question: 7

The value of foo.length is  2

Question: 8

The value of foo.x is undefined

Question: 9

Function print = "one", "three", "two" .

Question :10

It is difficult to define because doSomethingElse() function is not defined.

Explanation:

In question 1 the value of the foo variable is 1020 because we perform the string concat operation.

In question 2 Output of the code is false because float value keeps in binary and when we convert 0.1 or 0.2 to binary so it is not the same.

In question 3 the output of both functions is 7.

In question 4 the output is goh angasal a m'i because In this code we use the reverse() function, split() function and join() function. Reverse function reverses the value. split function splits the value and join function join all the value of the string in a line.

In question 5 we check the value.

In question 6, the first output is Hello World and second is ReferenceError.

In question 7, the value of foo.length is 2 because this foo array we insert only 2 values.

In question 8, the value of foo.x is undefined because in the variable we reset the value of foo all together, so foo.x value is undefined.

In the question 9 function print "one",  

"three",  

"two" because In the function first, we print the message that is "one" then we define a function in this function we print the value  

"two" but before creating object we call the "three" so the print value is "one",  

"three",  

"two".

In question 10 function, the output of this function is undefined.

3 0
3 years ago
Describing Editing Task
Gennadij [26K]

Answer:

changing the case of a word

changing the spelling of a word

changing a word to another word

Explanation:

7 0
3 years ago
Write a program that allows the user to input a total dollar amount for an online shopping order and computes and outputs the sh
tia_tia [17]

The program written in python 3 which prints the shipping cost based on the total shopping cost is written thus :

cost = int(input('Enter your shopping cost : '))

<em>#accepts</em><em> </em><em>integer</em><em> </em><em>input</em><em> </em><em>of</em><em> </em><em>the</em><em> </em><em>customer's</em><em> </em><em>shopping</em><em> </em><em>cost</em><em> </em>

if cost < 50 :

print('ship within USA : $6 ')

print('ship to canada : $8')

<em>#if</em><em> </em><em>cost</em><em> </em><em>of</em><em> </em><em>shopping</em><em> </em><em>is</em><em> </em><em>below</em><em> </em><em>$</em><em>50</em><em>,</em><em> </em><em>shopping</em><em> </em><em>to</em><em> </em><em>USA</em><em> </em><em>is</em><em> </em><em>$</em><em>6</em><em> </em><em>and</em><em> </em><em>Canada</em><em> </em><em>$</em><em>8</em>

elif (cost >=50) & (cost < 100):

print('ship within USA : $9 ')

print('ship to canada : $12')

<em>#if cost of shopping is between $50 and below $100, shopping to USA is $9 and Canada $12</em>

elif (cost>=100) & (cost < 150):

print('ship within USA : $12')

print('ship to canada : $15')

<em>#if cost of shopping is between $</em><em>100</em><em> </em><em>and below $</em><em>150</em><em>, shopping to USA is $</em><em>12</em><em> and Canada $</em><em>15</em>

elif cost > 150 :

print('ship within USA : Free')

print('ship to canada : Free')

<em>#if cost of shopping is above $150 ; then shipping cost is free to both countries. </em>

Learn more :brainly.com/question/24847242

5 0
2 years ago
Identify one type of business or organization that you believe would have serious risks if they chose to use VLANs and/or VPNs.
german

Answer:

National security agency

Explanation:

A lot of the private VPNs are own by corporations outside the USA, a national security agency is constantly sending sensitive and priceless data over the internet, when you decide to use a VPN it is possible for the service provider to share the decrypted information with others, therefore, if the national security agency at issue decide to use the service of an unscrupulous VPN provider their sensitive information could end in the hands of a foreign government who is willing to pay a lot for the data.

Note: there could be a case in which the VPN service provider is not corrupted, but the government forces them to share the information through legal actions.

5 0
4 years ago
It is important to understand the different types of DoS attacks and the symptoms of those attacks. Leaving a connection half op
solong [7]

Answer:

SYN flood attack.

Explanation:

Doing this is a symptom of an SYN flood attack. Attackers performing this type of DoS attack will try and open as many connections as possible but never fully finish the connection. This ultimately causes the system to use all of its computing power to try to resolve these failed connections which would cause the system to crash or become unresponsive. Therefore, denying service to potential clients if done correctly. This is just one of the many types of DoS attacks that exist.

8 0
3 years ago
Other questions:
  • Write a function namedadd_complex that adds the correspondingnumbers of its arguments (both complexstructures), then returns the
    5·1 answer
  • To increase the view of a document on the screen, use the _____. View icon Zoom slider full-screen reading boldface font
    9·1 answer
  • how can you repin an image on your Pinterest pin board A. click on the "repin" button B. click on the "add pin" button C. click
    7·2 answers
  • Charts are inserted into an excel spreadsheet using the commands in the charts group on the ____ tab on the ribbon.
    13·1 answer
  • Why should you avoid the use of sarcasm , cliches, and idioms in business letters?
    6·2 answers
  • java Consider a class MotorBoat that represents motorboats. A motorboat has attributes for: The capacity of the fuel tank The am
    15·1 answer
  • Successful implementation of an effective MRP system depends upon (1) the recognition of the difference between independent and
    13·1 answer
  • Once you have a listing of every unique combination of salesperson, product and location, what Excel function would you use to c
    14·1 answer
  • No careers combine more than one value
    7·1 answer
  • Why should you avoid the use of sarcasm, clichés, and idioms in business<br> letters
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!