1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
babunello [35]
3 years ago
11

Font size means the height of characters.TrueFalse​

Computers and Technology
1 answer:
svlad2 [7]3 years ago
8 0
True..................
You might be interested in
The objects that you place on master pages are called _____.
Studentka2010 [4]
The answer to this is A.
3 0
4 years ago
If you give someone ______ to your device, they can control it through another phone or computer.
icang [17]

If you give someone <u>Remote access </u>to your device, they can control it through another phone or computer.

<h3>What is  Remote entry?</h3>

An authorized user can use remote access to connect to a computer or network from a different location using a network connection. Users can connect to the systems they require through remote access even if they are physically far away.

Therefore, the dangers to remote access are:

  • There is a risk of device loss or theft due to a lack of physical security safeguards.
  • as the data is transmitted through a public internet, eavesdropping.
  • unapproved access to systems or data, possibly while oblivious to the screen.
  • If someone gets access to the gadget, they could watch and change the data.

Learn more about Remote access from

brainly.com/question/28900477
#SPJ1

5 0
2 years ago
7.1 What is the basic building block of an 802.11 WLAN? 7.2 Define an extended service set. 7.3 List and briefly define IEEE 802
Black_prince [1.1K]

Answer:

7.1)

BSS (Basic Service Set) is a basic building block of  802.11 wireless LAN.

It is the wireless station that executing the similar competing and the MAC protocol for accessing a similar wireless system is shared.

7.2)

The Extended Service Set is one of the basic components of IEEE 802.11 WLAN architecture which increases the mobility range to the individual BSS (Basic Service Set).

An ESS is the set that contains two or more than two Basic Service Sets

that forms an individual sub-network.

7.3)

The IEEE 802.11 service has the MAC layer implement which falls in two categories:

  1. Service Station.
  2. Distribution System Service.

Service Station - 802.11 standard has defined the services which is providing the functions among the stations.

It includes the following components:

  • Authentication
  • Deauthentication
  • Privacy
  • MSDU delivery.

Distribution System Service - It defined by the 802.11, provides the functionality across the distribution system and access point also provides the DSS.

It includes the following components:

  • Association  
  • Disassociation  
  • Distribution  
  • Integration  
  • Reassociation.

7.4)

It either may be or either not be a wireless network.  

Because distribution system has these three things:

  • Wired network
  • Wireless network
  • A switch

7.5)

Association agrees on the set security capabilities to use.

It also allows the mobile node which has made the transition to identifies itself to the AP (Access Point) within a BSS so that's why the nodes can be participated in the data exchanges with  another mobile nodes.

7.6)

The IEEE 802.11i are addresses the three types of security areas:

1) authentication,

2) key management,

3) data transfer privacy.

7.7)

7 0
3 years ago
Write down the pseudo code for a brute-force algorithm to compare elements in array A with elements in array B.
Thepotemich [5.8K]

Answer:

def brute_force(array1, array2):

   for item in array1:

       for element in array 2:

           if element == item:

               print(f"{element} and {item} are a match")

Explanation:

A brute-force algorithm is a direct-to-solution algorithm that searches and compares variables. It is like trying to unlock a safe but not knowing its four-digit combination, brute-force starts from 0000 through 9999 to get a match.

The python program implements the algorithm using two nested for loops. The first loop iterates over array1 while the second, over array2. For every item in the first array, the program loops through the length of the second array. For every match, the items are printed on the screen.

5 0
3 years ago
You are the security administrator for a bank. The users are complaining about the network being slow. It is not a particularly
bulgar [2K]

Answer:Denial of service

Explanation:Denial of service is the type of attack that is caused to the computer attacks. These attacks basically cause the circumstances such as difficulty in accessing of the website or resource, accessing particular computer system , creation of the traffic in network, This attack occurrence stops or create difficulties for the legal person to access the network .

Therefore, there is the occurrence of the Denial of service(DoS) in the bank's computer network.

3 0
3 years ago
Other questions:
  • Calculate the shear stress (lbf/in^2) for a given normal stress (lbf/in^2) that is applied to a material with a given cohesion (
    15·1 answer
  • Define a function CoordTransform() that transforms the function's first two input parameters xVal and yVal into two output param
    12·1 answer
  • Explain the difference between good and bad table structures. How do you recognize the difference between good and bad structure
    14·1 answer
  • Match the installation type to its description.
    9·1 answer
  • Which devices are managed through device management? Device management is the process of managing----(blank)-----devices.
    15·1 answer
  • After reading through the code, what will happen when you click run?​
    13·1 answer
  • Hi, I am from India. Our brainly platform isn't so good, many of 'em keep spamming questions that I ask. US platform seems much
    9·1 answer
  • You’ve been tossed into an insane asylum. What do you tell the people there to prove to them that you don’t belong inside?
    7·2 answers
  • Which keyboard shortcut pastes information from the clipboard?
    6·2 answers
  • Explain why it is wise to memorize your social security number.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!