1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
babymother [125]
3 years ago
10

Referat noaptea la școala cu sfârșit de groază​

Computers and Technology
1 answer:
solniwko [45]3 years ago
7 0

Te ajut eu daca vrei tu la refera

You might be interested in
What security weaknesses/vulnerabilities exist in Wireless local area network device hardware and software?
AfilCa [17]

Answer:

Explanation:

There are many weaknesses/vulnerabilities, some of which are the following...

Default Network Hardware, many individuals will go out and buy a new router and install it in their home. These devices come with a preset configuration including a preset security password which is many times a default password used for every router of the same model. This can be easily obtained by anyone who can then access the network.

Access Point hacking, an experienced individual can use a packet sniffer to detect the SSID that is frequently sent from the router in order to create an access point to be able to access the network.

WEP encryption is another vulnerability. These are very low security passwords that can be cracked using different software in a short period of time.

These are some of many vulnerabilities that wireless local networks have, but there are also many precautions and security measures that can be taken to prevent them.

7 0
3 years ago
A. Requiring computer users to log off before leaving for lunch
GuDViN [60]

Answer:

Option A, B, and D.

Explanation:

In the above question, the some details of the question are missing that is the part of the question.

Information Security applies to the mechanisms and techniques built and maintained to secure print, computerized, or any other type of personal, secret and confidential information or records from unauthorized access, usage, exploitation, release, damage, manipulation, or disturbance.

So, the following are the option that is true about the scenario.

Other option is not true about the scenario because Option C the click fraud are not the part or protect from the information security and Option F is not considered to the following scenario.

7 0
3 years ago
If cos 3/5 what is the sin and tan​
suter [353]

Answer:2.988584094

Explanation:

6 0
3 years ago
The fiber-optic cables that span the globe over land and under sea make up the internet _____.
mestny [16]
Faster and cheaper!!!!!!!!!!!!!!!
5 0
3 years ago
PLEASE HELP QUICKLY, I WILL GIVE BRAINLIEST TO THE BEST ANSWER!
dmitriy555 [2]

Answer:

If there are multiple schools in the teams table with the same name, each one of those rows will get joined to matching rows in the players table.

Explanation:

the answer must be match join?

6 0
3 years ago
Other questions:
  • Software development team leaders need blank skills to excel in directing their teams
    8·2 answers
  • For window 7 explain the steps you us to find the available program your software will list ?
    8·1 answer
  • In a C++ program, two slash marks ( // ) indicate:
    7·1 answer
  • A cast is required in which of the following situations? a. using charAt to take an element of a String and store it in a char b
    7·1 answer
  • An advertiser who sells coffee beans adds the keyword “Java'” to an ad group. After two weeks, she runs a placement performance
    8·1 answer
  • You use the Paste Options button labeled ____ if you want the pasted chart not to be linked to the source document and you want
    13·2 answers
  • Dust buildup inside a desktop PC case can be managed effectively by ____.
    7·2 answers
  • Brainstorming the pros and cons of upgrading versus replacing a set of ten desktop computers _________
    6·1 answer
  • Which of the following statements is false? A.The concepts of icons, menus and windows were originally developed by Xerox PARC.
    7·1 answer
  • Design the following webpage using suitable html code .
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!