1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrei [34K]
3 years ago
11

When you connect to an unsecured wireless network, what might dishonest or unscrupulous computer users try to do?

Computers and Technology
1 answer:
loris [4]3 years ago
8 0

Answer:

Hackers can snoop on data sent over your network.

Hackers can use your network to access your computer's files and system information.

Explanation: Unsecured Wireless connections are wireless connections which are have no passwords they are open to the general public,such networks can be very risky to use as it gives easy access to dishonest persons who can manipulate that opportunity to SNOOP ON DATA SENT OVER YOUR NETWORKS. They can use this hacking to fraudulently steal from your bank account and obtain your private information.

You might be interested in
A major problem with alcohol adverstising is that
Pavel [41]

Answer:

A chronic disease characterized by uncontrolled drinking and preoccupation with alcohol.

Alcoholism is the inability to control drinking due to both a physical and emotional dependence on alcohol.

Symptoms include a strong need or urge to use alcohol. Those with alcohol use disorder may have problems controlling their drinking, continue to use alcohol even when it causes problems, or have withdrawal symptoms when they rapidly decrease or stop drinking.

Treatment involves counseling, such as behavioral therapy, and medications that reduce the desire to drink. Some people need medical detoxification to stop drinking safely. Mutual support groups help people stop drinking, manage relapses and cope with necessary lifestyle changes.

Explanation:

8 0
3 years ago
How many different ways are there to save a document?<br><br> 1<br> 2<br> 3<br> 4
wolverine [178]
I’m pretty sure there are 2.

SAVE AS and SAVE
7 0
3 years ago
Read 2 more answers
HELP ME ASAP
Ede4ka [16]

Answer:

1 replies 2 tracking

Explanation:

edge

4 0
3 years ago
Read 2 more answers
How do the existence of the intranet and extranet help businesses (List 5 benefits of intranet and 5 of the extranet).
Dafna11 [192]

Answer:

An intranet is a private - internal - business network that enables your employees to share information, collaborate, and improve their communications. An extranet enables your business to communicate and collaborate more effectively with selected business partners, suppliers and customers.

6 0
3 years ago
How many Iron molecules are in the compound Fe4O2?
Greeley [361]

Explanation: Determine the mass of the substance, and its molar mass. Divide the given mass by its molar mass to get moles, then multiply times 6.022×1023molecules1mol

5 0
4 years ago
Read 2 more answers
Other questions:
  • Suppose sum and num are int variables, and the input is 18 25 61 6 -1
    11·2 answers
  • Which feature of a blog marks a unique link to each post through which it can be recalled anytime?
    8·2 answers
  • Help thanks appreciate it
    12·1 answer
  • A) Explain the concept of memory management unit as related to Operating systems.
    8·1 answer
  • Select the correct answer from each drop-down menu.
    8·2 answers
  • The best way to ensure the accuracy and safety of your accounts is to:
    10·1 answer
  • An IT suspects that an unauthorized device is connected to a wireless network. This is a result of pastry sharing on a device br
    13·1 answer
  • Help me! I’ll mark you brainly
    13·1 answer
  • The document that is use in excel to store an work with data that's formatted in a pattern of a uniformly space horizontalal an
    12·1 answer
  • What does c++ programming mean?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!