1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Volgvan
3 years ago
6

Can somebody help me with this please

Computers and Technology
2 answers:
LiRa [457]3 years ago
6 0

Answer:

Sorry for using up one of the answer thingys. But I thought this would make you laugh a little bit! Have a good day!

Explanation:

lys-0071 [83]3 years ago
3 0

Answer: I'm in six grade I can't do that stuff

Explanation:

You might be interested in
listen to exam instructions a small business called widgets, inc. has hired you to evaluate their wireless network security prac
Alex

Following actions could you most likely advise the client taking to strengthen the security of their wireless network-

  • Change the default SSID to anything different.
  • Turn off SSID broadcasting.
<h3>Explain the term wireless network security?</h3>
  • Designing, putting into practice, and ensuring security on such a wireless computer network are all parts of wireless network security.
  • A wireless computer network is further protected by this subset of network security.
  • Wireless security is another name for wireless network security.

For the stated question-

  • Disabling SSID broadcast and changing the network name are advised.
  • By disabling SSID, the network name won't be displayed on devices looking for a network can connect to, and so by changing the name, it will be impossible for anyone who already knows the old name to connect.
  • Both of which significantly boost security.

To know more about the wireless network security, here

brainly.com/question/28257213

#SPJ4

3 0
1 year ago
Complete the sentence. <br><br> ____ Is the study and use of very small technology units
kondor19780726 [428]

Answer:

nanotechnology

Explanation:

I just took the test

3 0
4 years ago
Which is an action that an operating system performs? (1 point)
Darya [45]

The  action that an operating system performs is that it facilitates a computer's basic functions between hardware and software.

<h3>What is the purpose of an operating system in a computer?</h3>

An operating system (OS) is known to be a term that is used in computing and it is said to be one which the program, after being started  is said to be loaded into the computer using the boot program.

It is one that helps to handle all of the other application programs in a computer.

The application programs is known to also make use of the operating system and as such, The  action that an operating system performs is that it facilitates a computer's basic functions between hardware and software.

Learn more about operating system from

brainly.com/question/22811693

#SPJ1

8 0
2 years ago
write a C program that declares an integer variable called "favorite_number". The program should then prompt the user to enter t
Arturiano [62]

Answer:

// here is code in C.

// headers

#include <stdio.h>

// main function

int main(void) {

// variable declaration

int favorite_number;

 // ask user to enter favorite number

printf("enter your favorite number : ");

 // read the number

scanf("%d",&favorite_number);

 // print the message

printf("your favorite number is: %d",favorite_number);

return 0;

}

Explanation:

Declare a variable "favorite_number" of integer type.Ask user to enter favorite number and assign it to favorite_number.Then print the message which include the favorite number.

Output:

enter your favorite number : 77

your favorite number is: 77

4 0
3 years ago
Becuase privacy is personal customers, where should your data privacy efforts align?
Olenka [21]
With your company’s goals
5 0
2 years ago
Other questions:
  • During an investigation of a cybercrime, the law enforcement officers came across a computer that had the hard drive encrypted.
    5·1 answer
  • 1. Describe a linear search (explain how it works).
    13·1 answer
  • The Quick Access Toolbar cannot be customized and have extra commands added to it
    5·1 answer
  • What can be can be considered data
    8·1 answer
  • The common channel signaling (CCS) system provides a separate network dedicated to control and signaling over the PSTN. This ena
    15·1 answer
  • The primary benefit of a VPN that uses _________ is that an intercepted packet reveals nothing about the true destination system
    6·1 answer
  • ____ the styles allows the designer to start from a known baseline, confident that no unwanted styles will creep in from any bro
    6·1 answer
  • Design and implement a set of classes that define various types of reading material: books, novels, magazines, technical journal
    8·1 answer
  • Unlike radio frequency identification (RFID) tags, bar codes: Question 30 options: require a reader that tunes into a specific f
    14·1 answer
  • Explain four sitting postures in a computer laboratory​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!