1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrey2020 [161]
3 years ago
9

The answer is D!!Readable code includes

Computers and Technology
2 answers:
lana66690 [7]3 years ago
6 0

Answer:

D

Explanation:

says in title

nikitadnepr [17]3 years ago
3 0
Ok but don't understand.
You might be interested in
What statement is used to close a loop started with a for statement?
liraira [26]
If I get what you are saying then you could use a work like end. :)
5 0
3 years ago
The most important form of nonverbal communication during a presentation is PowerPoint.
denis-greek [22]
It could also be eye contact
6 0
4 years ago
When you first log into linux, what is the current working directory?
mina [271]
This will depend on what the user has set the default working directory to. In order to check for yourself what your default working directory is inside linux, simply log in, click the start button>Click System Tools>LXTerminal. Once in the terminal, you can check your current working directory by typing in "pwd" without the quotation marks. Then, hit enter on your keyboard and the terminal will print your current working directory. I hope this has helped you.
6 0
4 years ago
Infer how oil pollution affects water mammals such as otters and seals
Snowcat [4.5K]
It can pollute the whater which is the habit to many animals making it not safe fo be in the whater
4 0
3 years ago
Barry discovers that an attacker is running an access point in a building adjacent to his company. The access point is broadcast
Kamila [148]

Answer:A) Evil twin

Explanation: Evil twin is a type of attack that happens in the network. This behaves as the alias wireless access point(WAP) which appeals toward users to get connected with false hotspot to steal their personal information.This attack is based on the rogue hotspot .Barry has also faced a evil twin attack while passing by a building and getting his device connected with fake hotspot.

Other options are incorrect because war driving is searching for the internet connectivity while driving,blue snarfing is done with Bluetooth to steal personal data and replay attack in which the transmitted data is repeated in malicious way.Thus, the correct option is option(A).

8 0
3 years ago
Other questions:
  • Devices such as monitors and printers that are connected to a computer are called ________.
    12·1 answer
  • What is faster a hi-speed usb port or superspeed usb port?
    13·1 answer
  • Late at night, some traffic signals change patterns and become _____.
    9·2 answers
  • What is the promotion and advertising stage of a product or service called?
    15·1 answer
  • Use the function random.randint to write a program that rolls a 6-sided die 100 times, and prints out all of the rolls.
    8·1 answer
  • Setting up a desktop computer for anAutoCADspecialist who needs a minimum of 125 GBram which operating system would be the best
    5·1 answer
  • What type of internet connection do you think you'd get in Antarctica?
    14·2 answers
  • What classes should I take in high-school for majoring in computer science?
    9·1 answer
  • What is the initial condition in this set of code?
    8·1 answer
  • Write a function named partfthat takes inas parameterstwo parallel lists: a list of times (in increasing order), and a list of d
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!