1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zanzabum
3 years ago
6

n what sense is it now possible for a country to be ""occupied"" by an invisible invader that arrives through airwaves and wirel

ess networks? A. It is almost impossible to block foreign countries’ satellite broadcasts and Internet transmissions. B. Spy satellites and other communications technology are increasingly advanced. C. Global positioning systems have allowed detailed mapping of previously inaccessible places. D. The U.S. government can eavesdrop on almost any form of modern communication.
Computers and Technology
1 answer:
Mademuasel [1]3 years ago
5 0

Answer:

Option A. is correct

Explanation:

It now not possible for a country to be "occupied" by an invisible invader that arrives through airwaves and wireless networks. It is almost impossible to block foreign countries’ satellite broadcasts and Internet transmissions inspite of Spy satellites and other communications technology and Global positioning systems.

Option A. is correct

You might be interested in
Write a C program that counts the number of vowels in a word. The C program reads words from an input file and then stores in an
polet [3.4K]

Answer:

Explanation:

The following code is written in C and does what the question requires. It uses the input file reads it and outputs the number of vowels to the file called output.dat

#include <ctype.h>

#include <stdio.h>

#include <stdlib.h>

#include <string.h>

int str_count_in_chars(char *start, char *end, char *chars) {

   int count = 0;

   for (; start != end; count += !!strchr(chars, *(start++)));

   return count;

}

void str_swap_in_chars(size_t str_len, char **str, char *chars) {

   for (int front = 0, back = str_len - 1; front < back; front++) {

       if (strchr(chars, (*str)[front])) {

           for (; !strchr(chars, (*str)[back]); back--);

           char tmp = (*str)[front];

           (*str)[front] = (*str)[back];

           (*str)[back--] = tmp;

       }

   }

}

char *file_to_str(FILE *fin) {

   int buf_len = 64;

   char buf[buf_len];

   char *str = malloc(buf_len);

   str[0] = '\0';

   for (int i = 1; fgets(buf, buf_len, fin); i++) {

       if (!(str = realloc(str, i * buf_len))) {

           fprintf(stderr, "%s:%d realloc failed\n", __FILE__, __LINE__);

           exit(1);

       }

       strcat(str, buf);

   }

   return str;

}

int main() {

   char *vowels = "aeiou";

   FILE *fin = fopen("input.dat", "r");

   FILE *fout = fopen("output.dat", "w");

   if (!fin || !fout) {

       fprintf(stderr, "%s:%d fopen failed\n", __FILE__, __LINE__);

       exit(1);

   }

   char *words = file_to_str(fin);

   fclose(fin);

   int words_len = strlen(words);

   for (int i = 0; i < words_len;) {

       if (isspace(words[i])) {

           fputc(words[i++], fout);

           continue;

       }

       int start = i;

       for (; i < words_len && !isspace(words[i]); i++);

       char *word = words + start;

       int word_len = i - start;

       int vowel_count = str_count_in_chars(word, words + i, vowels);

       if (vowel_count % 2 == 0) {

           str_swap_in_chars(word_len, &word, vowels);

       }

       fprintf(fout, "%.*s_%dvow", word_len, word, vowel_count);

   }

   fclose(fout);  

   free(words);

   return 0;

}

5 0
3 years ago
Which pair of properties apply to both sound and electromagnetic waves?
Alex73 [517]
Both waves can have interference, reflection, and diffraction.

Wave interference is a phenomenon that occurs when two waves meet while traveling along the same medium. The interference of waves causes the medium to take on a shape that results from the net effect of the two individual waves upon the particles of the medium.

Wave reflection happens when a wave reaches the boundary between one medium and another medium, a portion of the wave undergoes reflection and a portion of the wave undergoes transmission across the boundary.

Wave diffraction<span> involves a change in direction of waves as they pass through an opening or around a barrier in their path.<span> </span></span>
3 0
4 years ago
Read 2 more answers
A healthcare organization received notification that a hospital employee’s laptop that contained PHI was inadvertently left at a
timofeeve [1]

Answer:

Implement better protection and inform the staff.

Explanation:

The situation given in the question can be very alarming for a healthcare organization since the laptops contain critical information and details about the employee's work.

To prevent this from occuring again in the future, the organization should educate their employees on cyber security and having a strong password. They also should implement softwares on the computers against such incidents, which can be softwares that can lock the computers and delete files that are important to the organization if an unauthorized entry is detected. In order to protect the information, they can also use a backup system for every computer the employee's use.

I hope this answer helps.

7 0
3 years ago
What command should you use to determine the fqdn of a computer with ip address 172.31.209.5?
KatRina [158]
I use host -a

dig and nslookup could do it, I forget the switches and arguments.
8 0
4 years ago
Bruh why is everyone skipping my question!!!!!!!
DiKsa [7]

Answer:

What is your question?

Explanation:

7 0
3 years ago
Other questions:
  • The Active Directory Users and Computers tool can be used to:______.
    11·1 answer
  • Code a Boolean expression that tests if a decimal variable named currentSales is greater than or equal to 1000 or a Boolean vari
    11·1 answer
  • _____ is a computing model in which an organization outsources the equipment used to support its business operations, including
    15·1 answer
  • Which files have not been processed by your camera or computer?
    13·1 answer
  • Question 2Write a MIPS assembly implementation of the following C/C++ code. Assume small, unsigned integer arithmetic (no range
    10·1 answer
  • Alice is working in a database containing the names, service locations, and services offered by landscapers. She needs to find l
    12·1 answer
  • List 5 uses of computer​
    9·1 answer
  • Write a program in Python to sum to numbers:<br><br> Urgently needed, please.
    14·1 answer
  • True or False: VLANs in cloud computing are most likely to be found on direct connections with a CSP.
    9·1 answer
  • Which tool might be useful if you want to design a scratch game for preschoolers that avoids asking them to read instructions
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!