1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flauer [41]
3 years ago
7

What is the most important for you to choose before you build a network?

Computers and Technology
1 answer:
olga nikolaevna [1]3 years ago
4 0
Network media is most important
You might be interested in
What is the best way to protect computer equipment from damage caused by electrical spikes
bixtya [17]

An electrical spike is a temporary, very short (less than a second), increase in the electrical supply voltage.  A common surge protector will stop voltage spikes and surges.  Use surge protectors and UPS devices by connecting all sensitive electronic equipment to UPS or surge protection devices.

8 0
3 years ago
You can insert video by clicking video drop-down menu on the ______ tab.
Lostsunrise [7]
The correct answer is iii. Insert
7 0
3 years ago
Pls help! for computers edge 2021
KATRIN_1 [288]
I believe it is the first one, i did some research for this question
7 0
3 years ago
According to social penetration theory, the __________ dimension concerns the number of topics disclosed whereas the __________
dimulka [17.4K]
I am definitely sure that complete statement looks like this: According to social penetration theory, the breadth dimension concerns the number of topics disclosed whereas the depth dimension concerns the level of detail in topics disclosed. <span>Social penetration theory explains the differences between various levels of </span><span>interpersonal communication</span> in relation to the depth of interpersonal relationships.
7 0
3 years ago
Leo noticed that attackers have breached his wireless network. They seem to have used a brute-force attack on the WiFi protected
kakasveta [241]

Answer:

It is called a WPS brutal force attack.

Explanation:

Wired and wireless networks are both susceptible to attacks. The wired network, the advantage as a cable connection, is more secure than wireless networks, but wireless network also have security measures like the wifi protected set up (WPS).

WPS is used to connect to a network without passphrase, but with a key combination or a PIN.

Brutal force attacks are used on WPS to forcefully generate the PIN, using a third party software.

3 0
3 years ago
Other questions:
  • Your assignment is to write an assembly language program which read a string and print it in uppercase. This program asks the us
    15·1 answer
  • What is the meaning for science?
    14·1 answer
  • An organization uses SAP financial management software to store accounting details and Microsoft CRM software to record customer
    12·1 answer
  • What is the output of 1101 x 10 == 11000 + 10?
    12·1 answer
  • MIDI is a A.technology based on placing brief digital recordings of live sounds under the control of a synthesizer keyboard. B.t
    10·1 answer
  • Is badlion safe and how ?
    14·1 answer
  • Which of the following scenarios is an example of irrelevant media?
    11·1 answer
  • Which of the following translates packets so that the node can understand them once they enter through a port?
    5·2 answers
  • Define Agricultural Era
    14·2 answers
  • Write the Stats method record that takes a test score and records that score in the database. If the score already exists in the
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!