1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
-BARSIC- [3]
4 years ago
11

Let's get into some looping. Sometimes it is nice to generate your own data. Now let's take our first stab at it.

Computers and Technology
1 answer:
valkas [14]4 years ago
3 0

Answer:

55

Explanation:

You might be interested in
What is the purpose of copyfitting?
stiv31 [10]

Answer:

ms word can help you to writer and print

ur document and make u more attractive

Explanation:

a

3 0
4 years ago
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f
yaroslaw [1]

Answer:

Phishing

Explanation:

Phishing is a type of cyber attack in which the attacker masquerades as a trusted entity via e-mail and trick the recipient into clicking a malicious link that could steal user data including login details, credit card information e.t.c A phishing attack can have devastating effects such as Identity theft, Unauthorised purchase or stealing of funds on individuals.

The common types of phishing are<em>: Vishing, Smishing, Email Phishing, Search Engine Vishing, Whaling</em> e.t.c

3 0
4 years ago
Read 2 more answers
television broadcasts were originally delivered by using which technology? ethernet wireless coaxial cable broadband
laiz [17]

Television broadcasts were originally delivered by using:

  • Ethernet
  • Coaxial cable
  • [Wireless] or  Broadband

<h3>What is Ethernet is used for?</h3>

Ethernet is known to be a kind of network or services that is often used to link two or more devices in a network.

This is known to be very  popular kind of network connection. It is known to be used in  local networks by specific organizations such as offices, school campuses and  it is used often for Television broadcasts.

Therefore,  Television broadcasts were originally delivered by using:

  • Ethernet
  • Coaxial cable
  • [Wireless] or  Broadband

Learn more about Ethernet from

brainly.com/question/1637942

#SPJ1

7 0
2 years ago
1. provides a list of at least five SSIDs and the
taurus [48]

One of the most important ways to provide wireless security is through:

  • The use of encryption.

<h3>What is Wireless Security?</h3>

This refers to the network authentication and use of encryption to secure a network from unauthorized access or compromise of the network by an external agent.

With this in mind, we can see that SSID is a WiFi network name and it makes use of WPA2 security encryption to protect the wireless network through wireless encryption protocol.

Please note that your question is incomplete so I gave you a general overview to help you get a better understanding of the concept.

Read more about wireless security here:
brainly.com/question/14449935

8 0
2 years ago
How do mark somebody as brainliest??
svet-max [94.6K]

Answer:

Once more that one person answer, you will get an option next to the heart and the star that would look like a crown

Explanation:

That is how you do it.

4 0
3 years ago
Other questions:
  • What is a DreamScape?<br> Explain <br> and give example (if you want)
    10·1 answer
  • Java - Using a method, how do I "write a program whose input is a character and a string, and whose output indicates the number
    8·1 answer
  • Given two variables firstInClass and secondInClass which have already been associated with values, write code which swaps the va
    9·1 answer
  • What technology would it take to make a balloon that doesn't pop?
    6·1 answer
  • What type of maintenance is required of a computer’s power supply to ensure that it remains in working order?
    15·2 answers
  • What format should a cover letter be in?
    13·2 answers
  • What file name would allow you to easily find and edit your document later in Word Online?
    14·2 answers
  • How does digital camera differ than manula camera?​
    6·1 answer
  • Which of the following are the benefits of using Responsive Display Ads?
    9·1 answer
  • Do you know how to change your grades on a printer???????????
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!