1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MArishka [77]
3 years ago
5

Setting up network encryption involves

Computers and Technology
1 answer:
fiasKO [112]3 years ago
7 0
A or B cuz you need one of the two to have WiFi cuz my computer asks if i have an adapter and then SSID
You might be interested in
List at least four items that security policy should include
forsale [732]

Answer:

Purpose.

Audience.

Information security objectives.

Authority and access control policy.

Data classification.

Data support and operations.

Security awareness and behavior.

Encryption policy.

4 0
2 years ago
To what extent are the following computer systems instances of artificial intelligence:
ss7ja [257]

Answer: Supermarket bar code scanners and Voice-activated telephone menus are not instances of artificial intelligence

Explanation:

(a)Supermarket bar code scanners are only able to read the code however they are not able to perform any kind of machine learning techniques to be able to learn a sequence from the codes. As machine learning is a important part of artificial intelligence (AI) so they are not instances of AI. Similarly for Voice-activated telephone menus they could only display and cannot perform any intelligent task.

Web search engines and Internet routing algorithms are very dynamic and intelligent in processing and retrieving information to the end user.

So they are instances of AI.

8 0
3 years ago
Interactive sites where users write about personal topics and comment to a threaded discussion are called A. networking sites. B
Viefleur [7K]

The answer is definitely C: Blogs.

Blog is somewhat very similar to a website. It is sort of a journal that is mostly maintained by one person, the blogger. They are updated regularly and can contain information related to a specific topic. In most cases, blogs are used as dairy diaries about politics, people’s personal lives, or social commentaries. They give you, as a blogger, opportunities to interact with your visitors while promoting your products.

3 0
4 years ago
Read 2 more answers
Given two variables, is Empty of type boolean, indicating whether a class roster is empty or not, and number Of Credits of type
Alex_Xolod [135]

Answer:

     if(isEmpty || numOfCredits==3){

         

     }

Explanation:

Consider a complete java program below that prompts user for  number of credits and also asks if class roster is empty or not

<em>import java.util.Scanner;</em>

<em>public class num13 {</em>

<em>    public static void main(String[] args) {</em>

<em>        boolean isEmpty = false;</em>

<em>        Scanner in = new Scanner(System.in);</em>

<em>        System.out.println("Is class Rooster Empty? Yes or No");</em>

<em>        String ans = in.next();</em>

<em>        if(ans.equalsIgnoreCase("yes")){</em>

<em>            isEmpty = true;</em>

<em>        }</em>

<em>        else isEmpty =false;</em>

<em>        System.out.println("Enter number of credits");</em>

<em>      int numOfCredits = in.nextInt();</em>

<em>      if(isEmpty||numOfCredits==3){</em>

<em>          System.out.println("True");</em>

<em>      }</em>

<em>      else {</em>

<em>          System.out.println("Not true");</em>

<em>      }</em>

<em>    }</em>

<em>}</em>

4 0
3 years ago
To select both a field label and field value to move in a report design, after selecting the field label press the ____ key to s
marishachu [46]

Answer: Shift Key

Explanation: Field label is the components that used for the displaying of the  screen area and field values generate due to default. When these both are to be selected and moved in certain report design then the selection in made by first by selecting the field label and then alternately pressing the shift key to select the default field value. Thus, the field value and field label is moved into the report design.

8 0
3 years ago
Other questions:
  • Security testing attempts to verify that protection mechanisms built into a system protect it from improper penetration.
    9·1 answer
  • Which pair of properties apply to both sound and electromagnetic waves?
    10·2 answers
  • Software that enables you to display and interact with text and other media on the web is a web ________.
    15·1 answer
  • Charlie does not think he will be able to finish this project by the deadline at this point in the decision making process to so
    8·1 answer
  • Which feature of a word processing program enables you to represent an text information in the form of a diagram?
    14·2 answers
  • Chapter 7 presents a comparative analysis of various tools useful in policy making. Select two tools described in chapter 7 from
    12·1 answer
  • You can access various sites on the www by using hyberlinks or by
    15·1 answer
  • What is one way that Accenture helps clients ensure fairness when applying AI solutions?
    13·1 answer
  • Which word or phrase refers to an increasingly common method of computing and storing files?
    15·2 answers
  • What is the function of cpu while processing data?​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!