1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anastasy [175]
3 years ago
10

Which of the following is a technique used by hackers to identify unsecured wireless network locations to other hackers?A. Blues

narfingB. War dialingC. War chalkingD. War driving
Computers and Technology
1 answer:
natka813 [3]3 years ago
5 0

Answer:Is called war driving

You might be interested in
Six security issues and six descriptions are shown below.
Trava [24]

Answer:

The answer to this question is given below in the explanation section

Explanation:

This question contains six securities terms and definitions.

The goal of this question is to properly map the term to its correct description/definition.

You can find the complete mapping in the attached image.

7 0
2 years ago
I. A teacher can prepare a slide and demonstrate it in the class with the help
marin [14]

Answer:

ay di ko alam yan hahahaha

3 0
2 years ago
Which of the following color palettes for the BackColor and ForeColor properties contains colors that are guaranteed to be displ
Norma-Jean [14]

Answer: 1)System Palette

Explanation: System palette is kind of palette found in the system which contain the color values that is used by the display.This palette is also  drawing of the devices and applications.But the application don't get the direct access to the system palette rather logical palette permits it.

They work on the basis of the properties carried from the Back color and Fore color.Other palettes mention in the option is incorrect because these palettes don't work for the operating system's display .Thus the correct option is option(1).

8 0
3 years ago
The recommended flux for electrical soldering is A. antimony. B. sal ammoniac. C. rosin. D. muriatic acid.
expeople1 [14]
I pretty sure its D muriatic acid
3 0
3 years ago
Match each rule of composition with the image to which it applies
Anni [7]

Explanation:

where is the question?

6 0
2 years ago
Other questions:
  • What does computer means?
    13·2 answers
  • PLEASE HURRY
    13·2 answers
  • Question 1<br> a node is.<br> •a sever<br> A Cell Phone<br> A Laptop<br> a device on a network
    13·1 answer
  • What are some fun games to play on you phone?
    12·2 answers
  • If you want a user to actively participate in an online activity, create a web ______________.
    12·2 answers
  • A stateless firewall inspects each incoming packet to determine whether it belongs to a currently active connection.
    9·1 answer
  • Which company was the first to develop personal computers?
    6·1 answer
  • I will mark you as BRAINLIEST if you give me the correct answer of the questions... Pls asap with all details i am time limited
    15·2 answers
  • ________is one of the most popular payment gateways founded in in December 1998​
    8·1 answer
  • Identify the three fuzzy logic systems in the given text.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!