1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andre45 [30]
3 years ago
11

WILL GIVE MORE POINTS, PLEASE HELP!!!

Computers and Technology
1 answer:
Karo-lina-s [1.5K]3 years ago
5 0
Right 4 down 5 right 8 !!!!!!!!!
You might be interested in
Which of the following is the fastest processor
Nookie1986 [14]
Usually a Xeon is the fastest. Matters what time it was built and the chipset. If its old, the i7 is faster.
6 0
3 years ago
_____ is an instruction for a computer to perform a specific task.
alexandr402 [8]
A Command is an instruction for a computer to perform a specific task.
7 0
3 years ago
File " ", line 1
lilavasa [31]

Answer:

i = 1

while i < 11:

 print("The Indian High School")

 i += 1

3 0
3 years ago
You are implementing a wireless network in a dentist's office. The dentist's practice is small, so you choose to use an inexpens
Oksana_A [137]

Answer:

You should disable WPS in the access point's configuration.

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

In wireless access points, the encryption technologies used for preventing unauthorized access includes WEP, WPA, and WPA2.

In this scenario, you notice that an access point supports Wi-Fi Protected Setup (WPS) using a PIN and you are concerned about the security implications of this functionality. Therefore, to reduce this risk you should disable Wi-Fi Protected Setup (WPS) in the access point's configuration.

This ultimately implies that, the wireless access point will operate in an open state and as such would not require any form of password or PIN for use.

3 0
3 years ago
Which of the following tactics can reduce the likelihood of injury?
vova2212 [387]

Answer:

the answer is the use of tools that reduce the need for repetitive action

Explanation:

this  is the answer because with the use of these tools there is less of a chance of injury because there is less time and opportunity for this to happen with the lack of need of repetition

4 0
4 years ago
Other questions:
  • J'Dean is a team lead at a car wash. He wrote a memo to the employees, explaining some upcoming promotions, but J'Dean didn't fu
    6·2 answers
  • Which of the following phrases describes top-down processing
    8·1 answer
  • The picture that graphically represents the items you use in Windows is called a/an
    5·1 answer
  • The role of a computer-based instructional system is to deliver messages to learners. Those messages originated from a human tut
    10·1 answer
  • A field with the ____ data type can store a unique sequential number that Access assigns to a record. Access will increment the
    7·1 answer
  • ____ refers to the order in which values are used with operators.
    9·1 answer
  • The___ is usually the lead in a team of photographers.
    12·2 answers
  • What is the mest gun in pixel gun 3d imma give you brainliest
    14·2 answers
  • Two friends can share 100 songs from their Bluetooth enabled mobile devices
    13·1 answer
  • Assuming auto-mdix is not supported, which of these devices would require a crossover cable when connecting to a router? (select
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!