1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vekshin1
3 years ago
15

2. How is accessing the Internet through a home network and public Wi-Fi similar?​

Computers and Technology
1 answer:
Romashka-Z-Leto [24]3 years ago
6 0

Answer: it is not the same

Explanation: via public wi-fi u can easily be hacked but your home wi-fi is yours and u are safe there

You might be interested in
In Excel, you can sort a table by one or more columns by.
timofeeve [1]
Ushsbcjdiosjdhwjwjif math
8 0
3 years ago
If int a = 4, int *b = &amp;a , int **c= &amp;b;<br> what is the value store in c.
Elenna [48]

Answer:

5.

Explanation:

6 0
3 years ago
What is the Kali Linux's kernel?<br><br> Sorry for english, but help me.
fenix001 [56]

Answer:

I don't knwo if thsi is what you mean, but Kali is a Debian-derived Linux distribution

Explanation:

8 0
3 years ago
An alternative to configuring individual workstations is to establish configurations dynamically when the computers connect to t
Lapatulllka [165]

Answer:

come help me on my last question please

Explanation:

6 0
3 years ago
Design and implement a class called Sphere that contains instance data that represent the sphere’s diameter. Define the Sphere c
Zolol [24]

Answer:

Import java.awt.*;

import java.util.*;

public class Sprhere

{// Instance Data private double surfaceA, volume, r, diameter; //Constructors public Sphere ()

{r = 0;diameter = 0; surfaceA = 0;volume = 0;}

public Sphere (double radius, double d, double SA, double v)

{this. r = radius; this. diameter = d; this. surfaceA = SA;this.volume = v;}

//--------------------------------------------------------------------// Accesors.//--------------------------------------------------------------------public double get Radius()

{return r;}

public double get Diameter()

{return diameter;}

public double get SurfaceA()

{return surfaceA;}

public double get Volume()

{return volume;}

//--------------------------------------------------------------------// Mutators.//--------------------------------------------------------------------

3 0
3 years ago
Other questions:
  • Which type of architecture places a firewall in front of the VPN to protect it from Internet-based attacks as well as behind a f
    6·1 answer
  • 3.What is deep focus, and when is it a good choice for a scene?
    8·1 answer
  • 20. Which of the following describes an acceptable print resolution?
    10·2 answers
  • Enhancing and optimizing customer retention and loyalty is a major business strategy.
    15·1 answer
  • A commonly used font style is _____. superscript periwinkle times new roman point
    7·1 answer
  • which type of classroom enable students to attend lectures without being physically present with the teacher
    14·2 answers
  • A key physical design element is the ____, which describes how users interact with a computer system
    11·1 answer
  • Write a program that reads a person's first and last names separated by a space, assuming the first and last names are both sing
    10·1 answer
  • Which practice is the safest way to sit at a desk while typing on the computer?
    12·1 answer
  • What is a man-in-the-middle attack​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!