1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
murzikaleks [220]
3 years ago
9

How can you tell that someone is listening to what you through your device ?

Computers and Technology
1 answer:
Alika [10]3 years ago
6 0

Answer:here are some signs to look out for: Background noise. As with mobile devices, background noise whilst on a call is a sign that somebody else could be listening. Listen out for static, buzzing or clicks on the line.

Explanation:

You might be interested in
90 POINTS Hazel is working with a database to help determine if the company she works for is making or losing money. Hazel has o
VikaD [51]

Answer:

a

Explanation:

5 0
2 years ago
Read 2 more answers
The main disadvantage of using this device is its negative impact on network performance,resulting from the fact that any incomi
Reptile [31]

Complete Question:

The main disadvantage of using this device is its negative impact on network performance, resulting from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports.

Group of answer choices

a. Router

b. Switch

c. Bridge

d. Hub

Answer:

d. Hub.

Explanation:

A hub can be defined as a layer one (physical) device used for connecting various network devices such as switches and routers in a local area network (LAN). It comprises of many ports which are used for connecting segments of a local area network (LAN). Hubs are generally considered to be unintelligent because when frames are received at a port, it is then copied to every other connected port on the network.

<em>Hence, the main disadvantage of using a hub is its negative impact on network performance, resulting from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports.</em>

7 0
3 years ago
If you want a user to actively participate in an online activity, create a web ______________.
elena-14-01-66 [18.8K]

If you want a user to actively participate in an online activity, create a web ______________.  

1. animation  

2. application  

<u>3. page  </u>

4. source

6 0
3 years ago
Read 2 more answers
In the wireless telecommunications industry, different technical standards are found in different parts of the world. A technica
Serhud [2]

Answer:

A varying infrastructure.

Explanation:

The competitive pressure it creates for multinational companies in the industry is one of difference in infrastructure because different technical standards are found in different parts of the world.

For instance, A technical standard known as Global Systems for Mobile (GSM) is common in Europe, and an alternative standard, Code Division Multiple Access (CDMA), is more common in the United States and parts of Asia.

Consequently, equipment designed for GSM will not work on a CDMA network and vice versa as a result of varying infrastructure, so companies would be innovative in order to improve on their products.

3 0
3 years ago
What server role provides IEEE 802.1X authentication features? (Points : 5) File services
Citrus2011 [14]

Answer:Network policy and access services

Explanation: IEEE 802.1X is standard which stands for Port-based Network access control (PNAC). The authentication process of IEEE 802.1X is accessing should be managed through server, presence security factor , policies of network are managed and supported by network policy server .

The device that want to be connected with LAN or wireless LAN get though this authentication process.Other options are incorrect because files services, web servers and active directory domain services are not the factor that considered for authentication in IEEE 802.1X.

7 0
4 years ago
Other questions:
  • An automobile battery, when connected to a car radio, provides 12.5 V to the radio. When connected to a set of headlights, it pr
    11·1 answer
  • The utilization of a subset of the performance equation as a performance metric is a pitfall. To illustrate this, assume the fol
    13·1 answer
  • Analyze the following code. // Program 1: public class Test { public static void main(String[] args) { Object a1 = new A(); Obje
    5·1 answer
  • (1) Create three files to submit:
    8·1 answer
  • When replacing a thermostat or water pump, coolant drained from the cooling system should be ________.
    9·1 answer
  • Given a constant named size with a value of 5, which statement can you use to define and initialize an array of doubles named ga
    12·1 answer
  • What aspect should you consider before adding pictures to a document?
    6·1 answer
  • Write a program that inputs numbers and keeps a running sum. When the sum is greater than 100, output the sum as well as the cou
    8·1 answer
  • Jasmine wants electrical current to be able to pass through a certain switch on a circuit board that she is designing. What stat
    5·1 answer
  • You wrote a program to find the factorial of a number. In mathematics, the factorial operation is used for positive integers and
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!