1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pepsi [2]
3 years ago
6

Wireless networks use radio frequency (RF) or radio techniques, which allows wireless transmissions to reach out in all directio

ns, enabling connectivity but also allowing anyone in those directions to eavesdrop.
a. True.
b. False.
Computers and Technology
1 answer:
tia_tia [17]3 years ago
6 0

Answer: True

Explanation:

Yes, the given statement is true that that one of the quality of the wireless networks is that they uses the various radio techniques and the radio frequency.

 By using this techniques, the wireless transmission occur and it enable the connectivity and allow the direction of transmission to eavesdrop. It is one of the best technique as compared to the traditional method which include copper and fiber.

You might be interested in
Write programs in python to display “Valid Voter”. (condition : age of person should be
muminat

Answer:

X = int(input("Age = ")

if (X >= 18):

print('Valid Voter')

Else:

return 0

Try it and let me know. :)

4 0
3 years ago
What would be the result of sending the string AAAAAAAAAAAAAAAAAAAA into a variable that has allocated space for 8 bytes
DerKrebs [107]

The result of sending the string above into a variable that has allocated space for 8 bytes is that there will be Buffer Overflow Attacks.

<h3>What occurs when a string of data  sent to buffer is large?</h3>

A buffer overflow is also known as buffer overrun. This  is known to be a process that occurs when or if  the size of data is known to be more than the storage capacity of any kind of memory buffer.

Note that due to the overload, the program that is trying to write the data to the buffer will therefore overwrites to the adjacent memory locations.

Learn more about string from

brainly.com/question/26427527

4 0
3 years ago
Makes it possible to treat dates as other numbers
Vera_Pavlovna [14]
What do you mean?  <span>Makes it possible to treat dates as other numbers</span> 
8 0
3 years ago
Write a c program that prints the initial letter of name​
crimeas [40]

Answer:

#include<stdio.h>

#include<string.h>

int main(){

  char str[20];

  int i=0;

  printf("Enter a name: ");

  gets(str);

  printf("%c",*str);

  while(str[i]!='\0'){

      if(str[i]==' '){

           i++;

           printf("%c",*(str+i));

      }

      i++;

  }

  return 0;

}

Explanation:

8 0
3 years ago
Which of these is one of the primary concerns for protecting your family when online?
Lady_Fox [76]
Sharing personal information
7 0
3 years ago
Read 2 more answers
Other questions:
  • 1.an electronic index of books A. web page
    12·1 answer
  • While visiting a web site during your lunch break, you see a window that states the web site will not operate properly without f
    13·1 answer
  • Open a command prompt on PC1. Issue the command to display the IPv6 settings. Based on the output, would you expect PC1 to be ab
    7·1 answer
  • Your grandmother was an established artist and left you several original paintings after she died. Which of these statements is
    6·1 answer
  • Describe the difference between public and private IPv4 addresses. If a network is using private IP addresses, how can the compu
    13·1 answer
  • This measures how close a biometric reading is to a prerecorded template
    11·1 answer
  • Microsoft acknowledged that if you type a res:// url (a microsoft-devised type of url) which is longer than ____ characters in i
    9·1 answer
  • Does anyone know edhesive 4.3 question 1
    11·2 answers
  • Q) Look at the code sequence and select the correct output
    14·1 answer
  • What is the purpose of quick access toolbar?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!