1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ostrovityanka [42]
3 years ago
8

if a network security professional wants to connect some computers in the same building without it using a router what type of n

etwork is being used
Computers and Technology
2 answers:
marta [7]3 years ago
8 0

Answer:

 the MAC addresses of wireless NICs

Explanation:

snow_lady [41]3 years ago
6 0

Answer:

I would probably suggest <u>Peer-to-Peer</u>

You might be interested in
What: A challenging question on this module's material.
Alekssandra [29.7K]

Need further information!!!

6 0
3 years ago
When writing about environment concerns, which topic would demonstrate civic-mindedness on a global scale?
kherson [118]

Answer:

international agreements

Explanation:

7 0
3 years ago
Read 2 more answers
What does a class do?
SSSSS [86.1K]

Answer:

adds color to words

Explanation:

adds color to words

7 0
3 years ago
Several people work with data at Erica’s office. She enters data. One of her coworkers enters new product numbers. Another cowor
Dvinal [7]

Answer:

a software program for storing, managing, and retrieving information

Explanation:

8 0
3 years ago
Add me on Pokemon go, my trainer code is 5584 3300 5313
evablogger [386]

Answer:

no want it

Explanation:

7 0
3 years ago
Other questions:
  • Mobile providers can be susceptible to poor coverage indoors as a result of: a high degree of latency. network congestion that c
    8·1 answer
  • If the polar bear were taken out of the food chain what would happen to the seal population
    10·1 answer
  • The network layer, or osi layer 3, provides services to allow end devices to exchange data across the network. to accomplish thi
    15·1 answer
  • He primary purpose for attackers to send port scanning probes to hosts is to identify which ports are open. true false
    5·1 answer
  • How could a system be designed to allow a choice of operating systems from which to boot? What would the bootstrap program need
    14·1 answer
  • You realize your computer has been infected with malware. The program has been copying itself repeatedly, using up resources. Wh
    10·1 answer
  • Stella is surfing the Internet to look for affordable apartments in New York City. Every time she clicks on a link to a webpage,
    9·1 answer
  • Which term describes the gallery that allows you to customize and format text as a graphic? Pull Quote Text Box WordArt Drop Cap
    13·2 answers
  • "The ______ of an operational system that supports an organization includes policies, requirements, and conditional statements t
    13·1 answer
  • Any song recommendations, pls dont say 6ix9ine or lil pump
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!