1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Afina-wow [57]
3 years ago
7

Comments can be compared to a virtual _____.

Computers and Technology
1 answer:
Vladimir79 [104]3 years ago
3 0
What's the rest of the question? Like A - B - C - D?
You might be interested in
Assign decoded_tweet with user_tweet, replacing any occurrence of 'TTYL' with 'talk to you later'. Sample output with input: 'Go
nekit [7.7K]

Answer:

I am going to use the Python programming language to answer this. The source code is given below:

print("Enter your tweet here")

user_tweet = input()

decoded_tweet = user_tweet.replace('TTYL', 'talk to you later')

print("This is the decoded tweet: ")

print(decoded_tweet)

Explanation:

In the program the replace() module was used to replace 'TTYL' with 'talk to you later.'

Attached is the screenshot of the output.

8 0
3 years ago
Read 2 more answers
Which of the following careers is part of the Printing Technology pathway?
torisob [31]
Textile designer i think

6 0
3 years ago
Which of these are variables in an organization? Choose three.
Rzqust [24]

Answer:

Example of organizational variables are codes of ethics, ethical climate, organizational size, top management, organizational structure and organization culture.

Explanation:

Organizational variables can be defined as characteristics of a decision that influences the decision-making process and its outcome. This organizational variables also influence how an individual makes decisions.

Example of organizational variables are codes of ethics, ethical climate, organizational size, top management, organizational structure and organization culture.

6 0
3 years ago
By default Windows desktop displays
ankoles [38]
Every time Windows starts, or unlocks from the start screen, the Start Button and Task Bar is always displayed by default.

You will also see, the system tray and desktop background but these vary based on the amount of apps installed and user choice of wallpaper, so wouldn't necessarily count as defaults. 
3 0
3 years ago
Match the appropriate words to complete the paragraph.Wireless networks have no clear boundaries, therefore securing communicati
lawyer [7]

Answer:

a. Encryption.

b. Authentication.

c. Strong.

d. Rogue.

e. Insecure.

f. Hacking.

Explanation:

In Computer technology, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Wireless networks have no clear boundaries, therefore securing communications requires strong encryption, authentication, and strong protocols. One of the most common wireless security threats is the presence of rogue access points (APs). Rogue points can be set up for the benign purpose of free wireless access or for malicious purposes, such as gaining access to confidential data. Using an insecure wireless hotspot, like so many found in public settings, leaves you vulnerable to become the victim of hacking.

6 0
3 years ago
Other questions:
  • How can people make sure they are using credit cards responsibly
    14·2 answers
  • Employees at the Red Bluff Golf Club & Pro Shop have the opportunity to become certified trainers if they log enough hours.
    13·1 answer
  • What is a characteristic of the network layer in the OSI model allows carrying packets for multiple types of communications amon
    9·1 answer
  • A(n) _______ gate provides an output of 1 if either or both inputs are 1.
    14·2 answers
  • Menus are attached to the windows by calling
    15·1 answer
  • Write a program that has the user input how many classes they are taking this semester and then output how many hours they will
    8·2 answers
  • SOMEONE PLEASE HELP ME WITH THIS PLEASE HELP ME PLEASE!!!!!!
    6·1 answer
  • What are the four major software packages of microsoft​
    11·1 answer
  • We cannot imagine a life without the Internet. Imagine that you had to live without being connected to the Internet. Discuss the
    13·1 answer
  • CS902 Module3 Homework1
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!