1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pepsi [2]
3 years ago
7

Some attackers might create a peer-to-peer network that connects a wireless device directly to another wireless device, such as

the victim's laptop directly to the attacker's laptop. What is this type of network called?
Computers and Technology
1 answer:
julia-pushkina [17]3 years ago
4 0

Answer:

ad-hoc network

Explanation:

Ad-hoc network is a type of network that is setup to allow computers to talk to each other without the use of a router or server. The computers communicate directly with each other. In windows operating system ad-hoc is implemented as a communication mode which can be turned on.

You might be interested in
Role based access control
Phantasy [73]

Answer:

Is better in situation in which we want to assign the rights not to the people, but to the specific job

Explanation:

<u>Definition</u>

In an organization  to assigned the role in the network access based with in organization we RBAC.

Its model consists of

  1. users
  2. roles
  3. permissions
  4. sessions

Therefore, we can say that, <em>RBAC is better in situation in which we want to assign the rights not to the people, but to the specific job</em>

8 0
4 years ago
Davingould1115...................answer 3​
FrozenT [24]

Answer:

yo thx bro let me know if u need any more help

Explanation:

4 0
3 years ago
I need a quick way to see all hardware connected to my computer.
timofeeve [1]
Look it up..............
7 0
3 years ago
Which describes the first step a crawler-based search engine uses to find information?
Orlov [11]
<span>Crawler-based search engines are what most of us are familiar with - mainly because that's what Google and Bing are. These companies develop their own software that enables them to build and maintain searchable databases of web pages (the engine), and to organise those pages into the most valuable and pertinent way to the user.</span>
5 0
3 years ago
Read 2 more answers
How to contact list different from an address book
lisabon 2012 [21]

A contact list is different from an address book because your constancy list consist of people whom you know and choose to communicate with, while the address book gives you a list of the community’s residents phone numbers.



8 0
3 years ago
Read 2 more answers
Other questions:
  • How many people assume the product owner role in the Scrum framework?
    15·2 answers
  • What are the major features of a successful ethics training program and communication systems? Think of an example of a company
    13·1 answer
  • What is an advantage of using a meta-search engine?
    14·1 answer
  • You can use this effect to break a color into a percentage of its full strength.
    13·1 answer
  • How to allow all users to access a program?
    12·1 answer
  • What role do computer play in law and order​
    6·1 answer
  • What is binary ????????
    5·2 answers
  • i have a subscription under the name JaysonxH14, my email was never saved under the apple automatic password save. i cant figure
    14·1 answer
  • What is a saved link to a particular web page?​
    7·1 answer
  • Joe is examining the logs for his web server and discovers that a user sent input to a web application that contained the string
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!