1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Effectus [21]
4 years ago
7

'm translucent to they eye

Computers and Technology
1 answer:
Alenkinab [10]4 years ago
5 0
Amare might be your name
You might be interested in
Word provides an undo button that can be used to cancel the most recent command or action. true or false.
erastova [34]
The answer would be true.
7 0
3 years ago
Read 2 more answers
State three differences between a hard drive and a pen drive​
ExtremeBDS [4]

Answer:

A hard drive is what on your computer stores the operating system and all of the files you download. A pen drive (USB DRIVE) is a portable drive used for storing files that you can plug into computers with usb drive ports and transfer that data over to the computer through the USB Drive and you can also copy data onto the USB Drive from a computer and transfer it to other computers.

Explanation:

Computer Technician

7 0
4 years ago
What is an example of fibre optic cable<br>​
Arte-miy333 [17]

Answer:

printing cable

Explanation:

is a cable used to transfer information from a computer to the printer in packages

5 0
2 years ago
The roll out, roll in variant of swapping is used ____."
Sindrei [870]

Answer:

C.) for priority-based scheduling algorithms

Explanation:

for priority-based scheduling algorithms

4 0
3 years ago
What security weaknesses/vulnerabilities exist in Wireless local area network device hardware and software?
AfilCa [17]

Answer:

Explanation:

There are many weaknesses/vulnerabilities, some of which are the following...

Default Network Hardware, many individuals will go out and buy a new router and install it in their home. These devices come with a preset configuration including a preset security password which is many times a default password used for every router of the same model. This can be easily obtained by anyone who can then access the network.

Access Point hacking, an experienced individual can use a packet sniffer to detect the SSID that is frequently sent from the router in order to create an access point to be able to access the network.

WEP encryption is another vulnerability. These are very low security passwords that can be cracked using different software in a short period of time.

These are some of many vulnerabilities that wireless local networks have, but there are also many precautions and security measures that can be taken to prevent them.

7 0
3 years ago
Other questions:
  • What does CTR stand for?
    10·2 answers
  • How do switches and bridges learn where devices are located on a network?
    5·1 answer
  • As a load is mechanically lifted, the materials ____________________.
    7·1 answer
  • A tornado may be approaching if you observe which of the following?
    15·1 answer
  • What is used to configure data sources for applications that require access to a database?
    14·1 answer
  • Individuals who require better speed and performance for graphics-intensive applications (e.g., video editing, gaming, etc.) pre
    8·1 answer
  • What are the top ten alternative songs of the 2000's?
    7·1 answer
  • True or false? Colons are required when entering the MAC address into the Reservation window?
    14·1 answer
  • Leah wants to add an image to her updated presentation, so she wants to access the Help interface. What should Leah do to access
    11·2 answers
  • A small square at the right corner of the table is what?​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!