1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sedaia [141]
4 years ago
12

________ and wpa are wireless security protocols which use encryption to secure wi_fi networks.

Computers and Technology
1 answer:
ra1l [238]4 years ago
7 0
Im pretty sure its WEP :)
You might be interested in
What is the answer <br> Answer 1<br> Answer 2<br> Answer 3<br> Answer 4
faltersainse [42]

Answer:

Answer 2

Explanation:

8 0
2 years ago
Read 2 more answers
Tape is magnetic tape which sound ca be recorded , true or false?
scZoUnD [109]

Answer:

I think true

Explanation:

4 0
3 years ago
A water park will let a visitor on a ride if they are 48 or more inches tall OR they are 14 years old or older. WILL MARK BRAINL
Pavel [41]

Answer:

function waterPark() {

   var age = parseInt(prompt("Enter your Age: "));

   var height = parseInt(prompt("Enter your Height (in inches): "));

   if ( age >= 14 || height >= 48){

       console.log("You can ride in our park");

   } else {

        console.log("You are not eligible to ride in the park");

   }

}

waterPark( );

Explanation:

The Javascript function "waterPark" prompts users for their age and height to check if they are eligible to ride in the park. The prompt is parsed to an integer and assign respectively to the age and height variable.

The if conditional statement compares the age and height of the user to know if they are eligible to ride in the park or not.

6 0
3 years ago
___________ is an approach to boundary spanning that results from using sophisticated software to search through large amounts o
snow_tiger [21]

Answer: Business intelligence

Explanation:

Most of the enterprises and organizations collects huge amount of data through the use of MIS. These data can be based on any aspect of the business. But the collection of such large sets of data is useless until and unless there is a business intelligence associated with it. the work of business intelligence is to use software tools for analysis of the collected data so that it could be useful for enterprise or company to look for patterns and trends in the market.

The outcome of such business intelligence is very helpful particularly to managers, executives for taking particular decisions in the greater interest of the company.

So we can say, business intelligence is an approach to boundary spanning that results from using sophisticated software to search through large amounts of internal and external data to spot patterns, trends, and relationships that might be significant.

4 0
3 years ago
1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the
puteri [66]

Answer:

Encrypt this binary string into ciphertext: 110000. Include

in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m) = Y

-Decrypt this ciphertext into a binary string: 106

Now that you can see how public and private keys work in a real-world scenario, please explains how it works for computers and internet communications in relation to cybersecurity.

Explanation: ……………..

6 0
3 years ago
Other questions:
  • For local travel addresses and street names should be
    14·1 answer
  • Windows installer cannot install .exe files. to distribute a software package that installs with an .exe file, what must you do
    14·1 answer
  • If a user has one column in a table and would like to make it into two columns which command should be used?
    8·2 answers
  • Which statement below is not true of EFS
    7·2 answers
  • “Artificial intelligence is the tool of education in the near future”. Research on the possibility of “AI technology” in scienti
    15·1 answer
  • What is the empty space inside the character 'O' called?
    12·1 answer
  • What risks were involved?
    15·2 answers
  • Which of the two do you think is the most secure mode of communicating: sending a letter using the postal service or sending an
    9·1 answer
  • Order the steps for changing the settings of an outlook data file
    10·1 answer
  • Use a for loop to output the numbers from 50 to 65
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!