1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pepsi [2]
3 years ago
7

Some attackers might create a peer-to-peer network that connects a wireless device directly to another wireless device, such as

the victim's laptop directly to the attacker's laptop. What is this type of network called?
Computers and Technology
1 answer:
julia-pushkina [17]3 years ago
4 0

Answer:

ad-hoc network

Explanation:

Ad-hoc network is a type of network that is setup to allow computers to talk to each other without the use of a router or server. The computers communicate directly with each other. In windows operating system ad-hoc is implemented as a communication mode which can be turned on.

You might be interested in
what security threats do you face in your everyday computer usage? list the current security you use on your digital devices wha
gulaghasi [49]

Answer:

1. The basic threat is junk mails which contains malicious links. There can also be malicious applications on the web which when downloaded can also cause the download of malware. Zero day threats are also being used by hackers to target an OS for a single day.

2. Anti virus software such as MACFREE

3.Threats such as Computer virus, computer worms, Trojan horse, Phishing, Spyware, Rootkit etc. will targets network.

4. I will increase security by:

a) Installing a firewall

b) Updating all the applications and OS

c) Verifying applications before downloading

d) Boost access control by providing strong passwords

Explanation:

5 0
3 years ago
Create a class called Clock to represent a Clock. It should have three private instance variables: An int for the hours, an int
Anvisha [2.4K]

Answer:

public class Clock

{

private int hr; //store hours

private int min;  //store minutes

private int sec; //store seconds

public Clock ()

{

 setTime (0, 0, 0);

}

public Clock (int hours, int minutes, int seconds)

{

 setTime (hours, minutes, seconds);

}

public void setTime (int hours, int minutes, int seconds)

{

 if (0 <= hours && hours < 24)

      hr = hours;

 else

      hr = 0;

 

 if (0 <= minutes && minutes < 60)

      min = minutes;

 else

      min = 0;

 

 if (0 <= seconds && seconds < 60)

      sec = seconds;

 else

      sec = 0;

}

 

 //Method to return the hours

public int getHours ( )

{

 return hr;

}

 //Method to return the minutes

public int getMinutes ( )

{

 return min;

}

 //Method to return the seconds

public int getSeconds ( )

{

 return sec;

}

public void printTime ( )

{

 if (hr < 10)

      System.out.print ("0");

 System.out.print (hr + ":");

 if (min < 10)

      System.out.print ("0");

 System.out.print (min + ":");

 if (sec < 10)

      System.out.print ("0");

 System.out.print (sec);

}

 

 //The time is incremented by one second

 //If the before-increment time is 23:59:59, the time

 //is reset to 00:00:00

public void incrementSeconds ( )

{

 sec++;

 

 if (sec > 59)

 {

  sec = 0;

  incrementMinutes ( );  //increment minutes

 }

}

 ///The time is incremented by one minute

 //If the before-increment time is 23:59:53, the time

 //is reset to 00:00:53

public void incrementMinutes ( )

{

 min++;

 

if (min > 59)

 {

  min = 0;

  incrementHours ( );  //increment hours

 }

}

public void incrementHours ( )

{

 hr++;

 

 if (hr > 23)

     hr = 0;

}

public boolean equals (Clock otherClock)

{

 return (hr == otherClock.hr

  && min == otherClock.min

   && sec == otherClock.sec);

}

}

3 0
3 years ago
You want to transfer a document from one computer to another, and you want the document to be encrypted. The destination compute
Alex_Xolod [135]

Answer:

Check the explanation

Explanation:

This document transfer ought to work smoothly. Due to the IEEE standards and Principles, the presentation layer is expected to encrypt/decrypt the data on both part of the network. The session layer creates a mutual coordination among the applications while the transport layer is there to ensures delivery. Immediately the segments hit the network, routers control and handle the routing process of the packets to the distant end. Layers 6, 3 & 1 are straightly involved in the italicized parts of the question; however, the entire layers play a role when looking at the transfer as a whole.

5 0
3 years ago
Assume three jobs arrive at approximately the same time (arrival time are all 0), but Job A arrives slightly before Job B, and J
Komok [63]

Answer:

Explanation:

Correct:

8 0
3 years ago
What are the 7 c s of communication​
Hatshy [7]

Answer: the answer is A.

Explanation: hope this helps!

5 0
3 years ago
Other questions:
  • A password checking system that disallows user passwords that are proper names or words that are normally included in a dictiona
    15·1 answer
  • 1 Explain the difference between using a computer program and programming a computer.
    12·1 answer
  • What will be the result of running the following code fragment? int year = 0; double rate = 5; double principal = 10000; double
    14·1 answer
  • In a penetration test, a ________ team consists of IT staff who defend against the penetration testers. They are generally aware
    14·1 answer
  • A celebrity blogger you have followed for years advises readers to try a new beauty product. Before purchasing the product, a sa
    10·1 answer
  • The advancements in which of the following technologies has most changed the American job market in recent years?
    15·1 answer
  • Click this link to view O*NET's Skills section for Biomedical Engineers. Note that common skills are listed toward the top and l
    8·2 answers
  • Diferencias entre ciencia y tecnologia
    5·1 answer
  • How do I delete my Brainly account?
    6·2 answers
  • While storms could be a cause, power______ are more likely to be caused by disturbances from high-demand equipment in a home or
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!