1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vovangra [49]
3 years ago
9

If you could design your own home, what kinds of labor-saving computer network or data communications devices would you incorpor

ate
Computers and Technology
1 answer:
Kay [80]3 years ago
4 0

Answer:

Access Points, Home Server, and Virtual Assistant/IOT connected devices

Explanation:

There are three main things that should be implemented/incorporated into your design and these are Access Points, Home Server, and Virtual Assistant/IOT connected devices. Access Points for Ethernet, and HDMI should be located in various important walls near outlets. This would allow you to easily connect your devices without having to run cables around the house. A home server will allow you to easily access your data from multiple devices in your home, and if you connect it to the internet you can access that info from anywhere around the world. Lastly, would be a virtual assistant with IOT connected devices. This would allow you to control various functions of your home with your voice including lights, temperature, and locks.

You might be interested in
Formatting commands can be used to add number formats? True of false
Aleks04 [339]

Answer:

false

Explanation:

3 0
3 years ago
2.
BaLLatris [955]

Answer:

B. i < list.length

Explanation:

This question is terribly worded, but I assume the meaning is which answer will not result in an error if it's used in the while condition of the for loop.  The correct answer is b.  i < list.length is telling the loop to continue as long as the variable i is less than the length of the array list.

Answers C and D could potentially be valid under certain circumstances, but very unusual.  Answer A will give an error as list[list.length] will give an undefined value (assuming this is indeed javascript and not some other languge).

4 0
3 years ago
Read 2 more answers
What is a CPU or a GPU? What’s the difference? Which one is better?
Alik [6]
The CPU (central processing unit) has often been called the brains of the PC. But increasingly, that brain is being enhanced by another part of the PC, the GPU (graphics processing unit), which is its soul. The GPU renders images, animations and video for the computer's screen. GPUs are located on plug-in cards, in a chipset on the motherboard or in the same chip as the CPU.
6 0
3 years ago
Infer how oil pollution affects water mammals such as otters and seals
Snowcat [4.5K]
It can pollute the whater which is the habit to many animals making it not safe fo be in the whater
4 0
3 years ago
Match the appropriate words to complete the paragraph.Wireless networks have no clear boundaries, therefore securing communicati
lawyer [7]

Answer:

a. Encryption.

b. Authentication.

c. Strong.

d. Rogue.

e. Insecure.

f. Hacking.

Explanation:

In Computer technology, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Wireless networks have no clear boundaries, therefore securing communications requires strong encryption, authentication, and strong protocols. One of the most common wireless security threats is the presence of rogue access points (APs). Rogue points can be set up for the benign purpose of free wireless access or for malicious purposes, such as gaining access to confidential data. Using an insecure wireless hotspot, like so many found in public settings, leaves you vulnerable to become the victim of hacking.

6 0
3 years ago
Other questions:
  • What is an enterprise system
    14·2 answers
  • In which phase of the software development process would probing questions be used to verify the problem definition?
    12·1 answer
  • Write a java program which uses methods for calculating the sum of any 5 non-zero integer digits that are input. The program mus
    8·1 answer
  • python This program outputs a downwards facing arrow composed of a rectangle and a right triangle. The arrow dimensions are defi
    5·2 answers
  • What is the output of the following program?
    10·1 answer
  • How do you change the name on your brainly account?
    12·1 answer
  • Which of the following terms best describes the product development life cycle process?
    6·2 answers
  • I need help 50 points and brainless if you answer
    7·1 answer
  • Defination of formula bar​
    14·1 answer
  • Spark is electrical discharge in air, while air is mix of variety of gases what particles conduct electricity in gas
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!