1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Goryan [66]
3 years ago
8

Jen's laptop that is wirelessly connected to the home network router and turned on; her husband's PC, which connects to the rout

er by a cable that is turned off; her mother's virus-infected computer that has been unplugged from the router; and her daughter's smartphone that is wirelessly connected to the router.
Computers and Technology
1 answer:
SVETLANKA909090 [29]3 years ago
8 0

Answer:

The network is a LAN.

Explanation:

Computer networks are interconnection and intercommunication of computer devices to share resources. There are several types of computer networks, they are, LAN or local area network, WAN or wide area network, PAN or personal area networks, etc.

A LAN is a network of computer devices ranging from a floor of a building to the building of more. WAN is a network of LANs while a PAN is just a short 10-meter network between two Bluetooth connected devices.

The network described in the question is a wireless LAN or WLAN which is still a local area network.

You might be interested in
The COSO internal control framework identifies five components of an entity's internal control. Which, if any, of those five com
Llana [10]

Answer:

The COSO internal control framework identifies five components of an entity's internal control.

Which, if any, of those five components of Avon's internal control were flawed?

Of those five components of Avon´s internal control the following were flawed:

1) Information and communication

2) Monitoring

3) Control environment

Explanation:

1) Avon’s global internal audit staff thought about offering CPA provisions´s training to the employees, but it never happended due to budgetary limitations, nor it was informed or communicated to them. It was uncovered that the payments were being made to Chinese government officials in 2005,  however working for a U.S. Company, those bribes were not allowed.}

2) Monitoring: In December 2006, Avon’s global internal audit staff followed up doubtful  activity regarding this matter, but there was no monitoring or evaluations that the deficiencies within the internal control were changed to legal practices.

3)  This is a major internal control flaw as Avon discovered that there were illegal bribes being paid to Chinese government officials, thought about informing their employees that is was unacceptable but then chose not to, and finally was surprised when the bribes continued for another year.  This demonstred a lack of commitment to integrity and ethical values.  

7 0
4 years ago
Write a recursive method named digitSum that accepts an integer as a parameter and returns the sum of its digits. For example, c
harkovskaia [24]

Answer:

The function in Python is as follows:

def digitSum( n ):

if n == 0:

 return 0

if n>0:

    return (n % 10 + digitSum(int(n / 10)))

else:

    return -1 * (abs(n) % 10 + digitSum(int(abs(n) / 10)))

Explanation:

This defines the method

def digitSum( n ):

This returns 0 if the number is 0

<em> if n == 0: </em>

<em>  return 0 </em>

If the number is greater than 0, this recursively sum up the digits

<em> if n>0: </em>

<em>     return (n % 10 + digitSum(int(n / 10))) </em>

If the number is lesser than 0, this recursively sum up the absolute value of the digits (i.e. the positive equivalent). The result is then negated

<em> else: </em>

<em>     return -1 * (abs(n) % 10 + digitSum(int(abs(n) / 10)))</em>

4 0
3 years ago
What do you call the specific format that is used to give credit to someone else’s work, words or ideas?
Deffense [45]
It would be called a citation.
6 0
3 years ago
Read 2 more answers
For some brand-name computers, the hard drive contains a partition that can be used to reinstall windows. what is the name for t
NNADVOKAT [17]
This is referred to as the "Recovery" partition.
8 0
3 years ago
What is Mars internal composition
posledela
The majority of Mars' core is made up of volcanic "basalt" rock, which formed over millions of years from massive eruptions on the surface of the planet.
7 0
3 years ago
Other questions:
  • Which layer of the osi model contains tcp protocol, which is used for establishing connections and reliable data transport betwe
    15·1 answer
  • Mike is reading about machine-dependent programming languages. Which languages are machine-dependent programming languages?
    11·1 answer
  • Why might you need to convert a file to another file type
    11·1 answer
  • When emergency changes have to be made to systems, the system software may have to be modified before changes to the requirement
    6·1 answer
  • _____ is the standard that enables wireless devices to access web-based information and services.
    15·1 answer
  • Which of the following is an automated or manual file that stores information about data elements and data characteristics such
    6·1 answer
  • What correctly describes the features of the service called kickstarter?
    14·2 answers
  • Write a program that creates an integer array with 40 elements in it. Use a for loop to assign values to each element of the arr
    5·1 answer
  • Which computer peripheral is used when you would like to use a DVD or CD?
    12·2 answers
  • How do you get Brainliest on a question?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!