1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naddika [18.5K]
2 years ago
5

How can I use internet if data is turned off​

Computers and Technology
2 answers:
Anettt [7]2 years ago
8 0

Answer:

Use Wi-Fi

Explanation:

Wi-Fi, according to webopedia.com, is "the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections." If data is turned off, you can always count of Wi-Fi to provide a solid connection for you to access the internet.

Hope this helps!

miskamm [114]2 years ago
6 0
Use wifi reeeeeeeeeeeeeeeeeeee
You might be interested in
A strategy to solve a logic problem is to break it into steps. Using the drop-down menu, complete these sentences about solving
PSYCHO15rus [73]
I think the answer is 3!!
3 0
3 years ago
Read 2 more answers
Analizar los componentes de una computadora completa hoy en día comparada con el inicio de la Informática.
scZoUnD [109]

Answer:

Explanation:

Las computadoras que existian en el inicio de la informatica y las que existen ahora tenian los mismos componentes. Estos eran CPU, Placa Madre, RAM, HDD, y tarjeta grafica. Lo que si cambio fueron el velocidad y capacidad. Por ejemplo, en el inicio las Tarjetas de RAM venian como DDR a una velocidad maxima de 133 Mhz con una capacidad de entre 4mb y 8mb. Hoy en dia tenes RAM de DDR5 con una velocidad de 4400 Mhz y de 8gb. Mientras que avanzaba el tiempo los componentes de las computadoras aumentaban en velocidad y capacidad aunque el tamaño bajaba o aumentaba dependiendo del gusto del usario.

8 0
3 years ago
Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure mali
frutty [35]

Answer: The goals of computer security are to protect computers and users from data theft or loss as well as damage to any part of the computer.

Explanation: Common means of achieving computer security are firewalls, anti-virus software and this can fail due to hardware problems  or   weaknesses that prevent malicious attacks.

To answer this question, think of a time when you experienced any one of these. For example, personally, I was once an unfortunate victim of a general malicious attack that took advantage of a weakness in my anti-virus software. After clicking on a link on a dodgy website, a virus was installed on my computer. My computer finally crashed, without any hope of restarting it. I lost all my data and I had to buy a new computer.  This was a malicious attack.

However, sometimes people can be specifically targeted to steal their data or monitor their activities.  

7 0
3 years ago
Consider an array inarr containing atleast two non-zero unique positive integers. Identify and print, outnum, the number of uniq
Delvig [45]

Answer:

Program.java  

import java.util.Scanner;  

public class Program {  

   public static boolean isPalindrome(String str){

       int start = 0, end = str.length()-1;

       while (start < end){

           if(str.charAt(start) != str.charAt(end)){

               return false;

           }

           start++;

           end--;

       }

       return true;

   }  

   public static int countPalindromePairs(String[] inarr){

       int count = 0;

       for(int i=0; i<inarr.length; i++){

           for(int j=i+1; j<inarr.length; j++){

               StringBuilder sb = new StringBuilder();

               sb.append(inarr[i]).append(inarr[j]);

               if(isPalindrome(sb.toString())){

                   count++;

               }

           }

       }

       return count == 0 ? -1 : count;

   }

   public static void main(String[] args) {

       Scanner sc = new Scanner(System.in);

       String line = sc.next();

       String[] inarr = line.split(",");

       int count = countPalindromePairs(inarr);

       System.out.println("RESULT: "+count);

   }

}

Explanation:

OUTPUT:

3 0
3 years ago
A(n) ______________ ________________ attack keeps the target so busy responding to a stream of automated requests that legitimat
Tanya [424]

Answer:

denial-of-service (DoS) attacks

Explanation:

8 0
3 years ago
Other questions:
  • ________ is an open-source program supported by the Apache Foundation that manages thousands of computers and implements MapRedu
    5·1 answer
  • Why did artists use pinhole cameras during the renaissance?
    8·1 answer
  • A palindrome is a word or phrase that reads the same both backward and forward. The word ""racecar"" is an example. Create an al
    15·1 answer
  • In 2009, __________ accounted for 1,772 total fatalities. A. passengers riding with impaired drivers B. children hit by backing
    14·2 answers
  • If you wanted to buy a house that cost $150,000 and you knew you needed a down payment of five percent, how much would you need
    8·1 answer
  • Your boss is very skeptical about the idea of storing his files up in the cloud rather than on a local storage drive. He asks yo
    7·1 answer
  • PLEASE HELP ASAP!!
    11·1 answer
  • Give a detailed example of how an app (that you use regularly)uses parameters. You must state the app's name and function, the p
    7·1 answer
  • Who is tim berners-lee
    14·2 answers
  • Ethan wants to change the font in his document. He should _____.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!