1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MArishka [77]
3 years ago
5

Setting up network encryption involves

Computers and Technology
1 answer:
fiasKO [112]3 years ago
7 0
A or B cuz you need one of the two to have WiFi cuz my computer asks if i have an adapter and then SSID
You might be interested in
Design by contract considers the software system to be a setof:
Ludmilka [50]

Answer: A) clients and servers

Explanation:

 Design by contract considers the software system to be a set of Clients and server as, the contract designing is the contract software programming approached for making the effective system software. This type of approach are consider that all the components of the clients that are instance of an operation on the components of the server, which can fulfill the precondition specific requirements which including in that operations.

5 0
3 years ago
The list below show test scores for 3rd period on a recent test.
Serhud [2]

Answer:

dshfjkahsdfkjhasdkjfasd

Explanation:

this is what u get for doing this to others foool

6 0
3 years ago
Virtual classrooms are examples of communication or not​
3241004551 [841]

Answer:

I would say yes

Explanation:

8 0
3 years ago
Read 2 more answers
Alarm filtering may be based on combinations of frequency, similarity in attack signature, similarity in attack target, or other
dezoksy [38]

Answer: False

Explanation:

 The given statement is false, as the alarm filtering is the process of classifying the various type of IDPS alert in the system and it can be managed more efficiently.

The IDPS administrator can easily set an alarm filtering in the running system. It can generate the various types of positive tract in the system and then adjust the different alarm classifications. Alarm filters are same as the packet filter in which they can easily filter the items from the source and destination IP address.

3 0
3 years ago
D. DROP
just olya [345]

Answer:

The correct answer is B. BLOB.

6 0
3 years ago
Other questions:
  • using unsafe sites may be a. harmful to your computer c. okay as long as you don���t leave any personal information b. okay as l
    9·2 answers
  • Ascending and descending are examples of
    5·2 answers
  • how to create a program that prime number include arraylist , and if not print the prime factors of the number.
    13·1 answer
  • Why do computers use zeros and ones? a. because combinations of zeros and ones can represent any numbers and characters b. becau
    6·1 answer
  • Fazer um programa em C++ que contenha 3 funções sendo:
    11·1 answer
  • Adam has decided to add a table in a Word doc to organize the information better.
    10·1 answer
  • BrainPower Tutoring The owner of BrainPower Tutoring needs an application to calculate and print estimates to provide to potenti
    14·1 answer
  • Students who utilize the "read, underline and eliminate" strategy are more likely to get better test grades. Why do you think th
    12·2 answers
  • What will be displayed after code corresponding to the following pseudocode is run? Main Set OldPrice = 100 Set SalePrice = 70 C
    10·1 answer
  • ) Write a program to calculate the time to run 5 miles, 10 miles, half marathon, and full marathon if you can run at a constant
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!