1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melisa1 [442]
3 years ago
14

The right to make others do things is referred to as _________.

Computers and Technology
2 answers:
solniwko [45]3 years ago
4 0

Answer:

b

Explanation:

Nady [450]3 years ago
3 0

Answer:

I think B hope its right

You might be interested in
Which security protocol for wireless networks attempts to establish the same security for them as would be present in a wired ne
xz_007 [3.2K]

The security protocol for wireless networks attempts to establish the same security for them as would be present in a wired network is WEP. The correct option is A.

<h3>What is WEP?</h3>

Wired Equivalent Privacy (WEP) is a security protocol defined by the IEEE 802.11b Wireless Fidelity (Wi-Fi) standard.

That standard is intended to provide a wireless local area network (WLAN) with security and privacy comparable to that of a wired LAN.

WEP is a wireless network security protocol that attempts to provide the same level of security as a wired network.

Thus, the correct option is A.

For more details regarding WEP, visit:

brainly.com/question/13775698

#SPJ4

Your question seems incomplete, the missing options are:

A. WEP

B. WEB

C. WELL

D. WALL

7 0
2 years ago
which of the following sentences uses active voice?(answers to choose from are in the photo)-this is in my computer applications
andrezito [222]
Last week, Nate and I counted all the inventory. answer :A
6 0
3 years ago
Read 2 more answers
Anyone want brainliest?
hichkok12 [17]

Answer:

me

Explanation:

loggers

6 0
3 years ago
For the following code, how many times would the for loop execute? String str = ("Ben and Jerry's ice cream is great."); String[
Kay [80]

Answer:

D. 7

Explanation:

Given code:

String str = ("Ben and Jerry's ice cream is great.");  

String[] tokens = str.split(" ");  

for (String s : tokens) System.out.println(s);

Splitting the given sentence on space character yields 7 tokens, namely:

Ben , and , Jerry's , ice , cream , is , great.

So the for loop will execute 7 times, once for each token because the loop variable s is assigned an individual token on each iteration.

3 0
3 years ago
is a traditional function of the MIS department. Group of answer choices Infrastructure planning, development, and control Initi
Stels [109]

Answer:

Infrastructure planning, development, and control

Explanation:

MIS also known as Management information system is the department with the responsibility of controlling software and hardware system that are used by organizations to make critical decisions. The traditional function of the MIS include:

1. Providing technical services throughout the organization

2. Infrastructure planning, development, and control

3. Staffing and developing information system skills in staff through training

4. Management of computers operations and center

5.  Management of systems project management and development.

4 0
3 years ago
Other questions:
  • An excel file called “student_gpa” is opened. What does the funnel next to “GPA” indicate
    5·1 answer
  • Pressing the Ctrl+Home keys moves the insertion point to the
    5·1 answer
  • Given a scanner reference variable named input that has been associated with an input source consisting of a sequence of integer
    14·2 answers
  • What is the solubility of an empty soda can
    10·1 answer
  • How does the access point know whether a wireless data packet is intended for its network?
    14·1 answer
  • A key field is used to _____. enter a password uniquely identify records merge data list the most important information
    12·2 answers
  • _________ is a hybrid cryptosystem that combines some of the best available cryptographic algorithms and has become the open-sou
    5·1 answer
  • What do you call an unsolicited email message that masquerades as coming from a legitimate sender, and attempts to get you to di
    11·1 answer
  • Write a java program that prompts the user to input the elapsed time for an event in hours, minutes, and seconds. The program th
    13·1 answer
  • What is syntax?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!