1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anastasy [175]
3 years ago
10

Which of the following is a technique used by hackers to identify unsecured wireless network locations to other hackers?A. Blues

narfingB. War dialingC. War chalkingD. War driving
Computers and Technology
1 answer:
natka813 [3]3 years ago
5 0

Answer:Is called war driving

You might be interested in
(TCO C) When a remote user attempts to dial in to the network, the network access server (NAS) queries the TACACS+ server. If th
Likurg_2 [28]

Answer:

The correct answer to the following question will be "The user is prompted to retry".

Explanation:

NAS seems to be a category of server system a broader open internet as well as web through in-house and perhaps remotely associated user groups.

  • It handles as well as provides linked consumers the opportunity to provide a collection of network-enabled applications collectively, thereby integrated into a single base station but rather portal to infrastructure.
  • Unless the text or response sent to the server seems to be REJECT, this implies that the authentication process continued to fail and therefore should be retried.

5 0
2 years ago
Which engineer may design a GPS for a vehicle?
Crank

Explanation:

Mechanical engineer may design a gps for a vehicle.

4 0
2 years ago
Which software programs should students avoid using to create and submit course work? (Choose all that apply). Word, Pages, Numb
Aleksandr [31]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

You can submit your course work most often in a Word document. Because in the word document, you can insert text, numbers, images, charts whatever you want such as required for writing a book- easily.

The correct options to this question, that you should need to avoid using to create and submit course work are pages, numbers, and keynote.

Because while submitting the course work, you need to submit a complete word document, it is not required to you that you have to submit numbers, pages, or keynotes along with the course assignment. You can create a course assignment or project document in word and submit to your respective teacher. However, you can not create your course work using keynotes or pages, etc as given in the question.

3 0
2 years ago
How does computer applications affect our lives daily? 1- paragraph (4 sentences)
Mnenie [13.5K]

Answer:

Computers affect our lives daily because we use them everyday to browse the internet and solve problems in real life. They help solve problems and without them, getting certain information would be much harder. They help us interact with friends from anywhere in the world and communicate with relatives. It has also helped us during this pandemic and lets us learn from school in the safety of our own home.

( hope this helps, i wrote it myself ;-; )

4 0
3 years ago
Read 2 more answers
Which tasks can a user accomplish by using the Find and Replace feature of Word? Check all that apply.
sveticcg [70]

Answer:

B,C,E your welcome

Explanation: i just took the test

3 0
2 years ago
Other questions:
  • This is the main work area of your computer.
    7·1 answer
  • John would like to move from the city into the suburbs and has been saving up a large down payment for a home. Which is the most
    7·1 answer
  • Which of the following components controls the opening and closing of the valves in an engine ?
    15·2 answers
  • A user calls you and says that when they try to connect to the internal website, they are prompted for authentication. The user
    14·1 answer
  • A ______ is an exact duplication of the hard drive, including data files, system files, and settings, application files, and the
    15·1 answer
  • What does it mean when a computer can't break the rules
    10·2 answers
  • 1) which of the following is not a characteristic of valuable information?
    8·1 answer
  • For a parking application that lets you pay for parking via your phone, which of these is an example of a functional requirement
    8·1 answer
  • Animals living in burrows under the ground is an interaction between the biosphere and the
    11·1 answer
  • 1. The letters that appear after the dot after a file name are called the:
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!