1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VashaNatasha [74]
3 years ago
6

¿cuáles son los usos que se le pueden dar a una bicicleta?

Computers and Technology
1 answer:
riadik2000 [5.3K]3 years ago
7 0

Answer:

pues de decoracion las llantas de columpios y los cuernos de antenas de tele okey no me presiones estoy en clase y acabo de hacer 11 ejercicios y acaba de empezar ok

You might be interested in
What does N represent when analyzing algorithms?
Mademuasel [1]

Answer: "N" is considered as the size of the input that is being given in the algorithm.

Explanation: During a problem solving process , a algorithm is used to analyze the problem . Many function and  steps are to be taken care of while analyzing algorithm. Among analyzing step, input is also given which is usually zero more than that . An input has a certain size which is given by the initial "N".  The input size defines the length of the string for the input.

4 0
3 years ago
Which data type is also called a binary object?
Leno4ka [110]
For Plato users it's 
2. BLOb
4 0
3 years ago
What can you do to make sure no one outside your company can gain access to its wireless network?
Oksana_A [137]

Disable SSID broadcasting, Lower radio energy groups, and Enable MAC filtering.

<h3>Why would you disable SSID broadcasting?</h3>
  • Disabling the SSID Broadcast is one method of ensuring your wireless web.
  • This procedure will stop other users from detecting your SSID or your wireless network title when they attempt to view the available wireless networks in your area.
  • The network character exists delivered to wireless devices, which is the reason for disabling the SSID broadcast.
  • A typical wireless adapter and its associated software will identify and list all available SSIDs for networks that are within range.
  • When somebody disables SSID broadcast on any of those networks, the network will no extended show up in the wireless adapter's list of known networks.

To learn more about Disable SSID broadcasting, refer to:

brainly.com/question/15289342

#SPJ4

The complete question is:

Your company shares a building with a competitor's branch office. Recently, you noticed that some computers other than company computer have tried to connect to the wireless network unsuccessfully. When you are in the parking lot, you also notice that the company's wireless network SSID can be seen on your smartphone.

What can you do to make sure no one outside your company can gain access to its wireless network?

6 0
2 years ago
What will be the output of the following query on the table below?
shtirl [24]

Answer:

b

Explanation:

7 0
3 years ago
Read 2 more answers
Software engineering is not only concerned with issues like system heterogeneity, business and social change, trust, and securit
jenyasd209 [6]

Answer:

follows are the solution to this question:

Explanation:

Confidentiality:

It always agrees with all of this, even though there is no security arrangement, and the theoretically facilitates the free exchange of information between both the client as well as the worker or understands that perhaps the personal life of a client and then all the concerns and problems we have belongs to them.

Competence:

It didn't distort the skill level in such a specific field or topic, it is the talent or capacity, and being able to be doing something well or be sane enough just to face charges in court.

Intellectual property rights:

It will be mindful of regional intellectual property laws in which the individuals over its mind's constructs are given over a certain amount of time, which typically gives the maker the exclusive right to use his / her development.

5 0
3 years ago
Other questions:
  • Write the definition of a function powerTo which recieves two parameters, a double and an integer. If the second parameter is po
    13·1 answer
  • What are options in the Advanced tab in the Share Workbook dialog box? Check all that apply
    14·2 answers
  • How do you find the exterior angle measure of any regular polygon? (The degree in which to turn the turtle to draw a shape)
    10·1 answer
  • Shape: element::paintbrush: ..............
    7·1 answer
  • What needs to be true of data used in consolidation
    14·1 answer
  • What is the current when the voltage is 18 volts and the resistance is 6 ohms?
    7·1 answer
  • Which concept often comes in conflict with privacy rights?
    14·1 answer
  • Why do you need to cite your sources? (check all that apply)
    15·1 answer
  • A reflective cross-site scripting attack (like the one in this lab) is a __________ attack in which all input shows output on th
    14·1 answer
  • Write a description about this picture
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!