1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
motikmotik
3 years ago
10

I like to troll what about you

Computers and Technology
1 answer:
Maksim231197 [3]3 years ago
7 0

Answer:

same

how's your day going?

Explanation:

You might be interested in
Should the security researcher have published exploit code that affects every version of Windows and cannot be patched
grandymaker [24]

Answer:

No.

Explanation:

This is because there is probably the risk of malicious attackers grabbing the published exploit code that affects every window and then utilizes it for dubious purposes. Such as stealing vital information after gaining access.

The most ideal way for the security researcher to go about the exploit code that affects every version of the window is to meet the windows manufacturers, discuss the negative issues of windows software with them and eventually assist them in the software update to troubleshoot the patch.

8 0
3 years ago
Convert the decimal number -12 to hexadecimal (2's complement)
Helga [31]

Answer:

FFF4

Explanation:

Binary representation of 12 = 00001100

Expressing it in hexadecimal format : 0C

Binary representation of -12:

Step 1 : Computing 1's complement for 12 =11110011

Step 2 : Adding 1 to 1's complement to get the 2's complement =>

11110011+1 = 11110100

Converting the 2's complement representation to hexadecimal format:

F4 ( 8 bit representation) or FFF4 ( 16 bit representation)

4 0
3 years ago
PARTNERING AS IT RELATES TO BPR.​
balandron [24]

Answer:

The answer to this question can be defined as follows:

Explanation:

The term BPR stands for "business processes reengineering", It is the recreating of the core business process to improve product performance or reliability or lower costs.

  • It generally includes analyzing business processes, which identifying sub-par or ineffective processes but identifying ways to dispose of or change it.
  • IT important for improving changes, especially to shift in aspects of the work, its incorporation in business operations, or competitive strength change.
  • It might contribute to making reconfiguration improvements, and is known as a BPR enabler.
6 0
4 years ago
Bob has been asked to do research into increasing the accuracy in identifying rogue APs in his enterprise. Which rogue AP system
Bas_tet [7]

Considering the situation described above, the rogue AP system detection probe that will allow Bob's company's IT department to monitor the airwaves for traffic, amongst others, is <u>Wireless Device Probe.</u>

This is because the <u>Wireless Device Probe</u> possesses a WiFi interface that occasionally produces a wireless probe procedure through the effective transmission of a control frame.

This process is often referred to as '<u>probe request</u>''.

The purpose of <u>Wireless Device Probe</u> is to ensure that closer wireless access points transmit information about wireless networks that are accessible for connection.

Hence, in this case, it is concluded that the correct answer is "<u>Wireless Device Probe."</u>

Learn more here: brainly.com/question/10249897

6 0
2 years ago
A(n) ____ network uses a central cable to which all network devices connect.
NNADVOKAT [17]
<span>A bus network uses a central cable to which all network devices connect</span>
4 0
3 years ago
Other questions:
  • 7.12 LAB: Contains the character
    12·2 answers
  • When would a one way flag variable be used
    10·1 answer
  • Which of the following would increase the Demand for jam?
    14·1 answer
  • To protect a computer, it is a good idea to install and frequently run
    6·2 answers
  • Apart from the OOPs concepts learned in this lesson, identify additional concepts and write an essay on their functions. Explain
    9·1 answer
  • Write programs in python to display “Valid Voter”. (condition : age of person should be
    15·1 answer
  • PLEASE HELP!! Computer science test
    11·1 answer
  • When do you use an else statement?
    10·1 answer
  • An online bank wants you to create a program that shows prospective
    12·1 answer
  • What is the minimum ethernet frame size that will not be discarded by the receiver as a runt frame?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!