1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irinina [24]
3 years ago
8

The library Wi-Fi kiosk requires a symmetric connection to the Internet. Which WAN technology would probably be the least expens

ive option if the kiosk is within 0.75 miles of the telephone distribution office?
Computers and Technology
1 answer:
kenny6666 [7]3 years ago
6 0

Answer:

The answer is IP-sec.

Explanation:

0.75 miles of range is a low distance for a WAN (Wide Area Network) so a point-to-point WAN tehcnology such as IP-sec or SD-WAN can be preferred. But the least expensive option would be choosing IP-sec as specified in the question.

I hope this answer helps.

You might be interested in
Pa help please I need help<br>10 points :'(<br>nonsense report:<br>1 heart​
tatuchka [14]

Answer:

√ 1. Cellphone

<h3>Product Description:</h3>

A cellphone is any portable telephone that uses cellular network technology to make and receive calls.

7 0
2 years ago
The input nums is supposed to be an array of unique integers ranging from 1 to nums.length (inclusive). However, there is a mist
Elden [556K]

The program is an illustration of loops.

Loops are used to perform repetitive and iterative operations.

The program in Python where comments are used to explain each line is as follows:

#This intializes the list

nums = [5,4,4,2,1]

#This gets the length of the list

size = len(nums)

#This iterates through the list

for i in range(size):

   #The following if condition determines the repeating number

   if nums[abs(nums[i])-1] > 0:

       nums[abs(nums[i])-1] = -nums[abs(nums[i])-1]

   else:

       repeating = abs(nums[i])

   #The following if condition determines the missing number

   if nums[i]>0:

       missing = i + 1

   

#This calculates and prints the sum of the missing and the repeating numbers

print(repeating+missing)

Read more about similar programs at:

brainly.com/question/13549861

6 0
3 years ago
Which of the following is not a valid way to avoid search problems when you want to search for rows that have a specific date in
NNADVOKAT [17]

Answer:

use the TO_DATE function to remove the time values from the dates in each column

Explanation:

DATE types are involved in most obfuscations. One database that has been considered vulnerable in this regard is the Oracle database due to the fact that a time component is always included in its DATE type. Usually, the common practice would be to use the TRUNC function for the purpose of removing the time component, when in real sense, this function does not actually remove the time. Hence to avoid search problems when searchinc for rows with a specific date in a column defined with the DATE data type, it is most effective to use the TO_DATE function to remove the time values from the dates in each column.

6 0
3 years ago
Design a program that asks the user to enter a month (in numeric form), a day, and a two-digit year. The program should then det
Irina-Kira [14]

Answer:

#include <iostream>

using namespace std;

int main()

{

   int mt, day, yr, magic;

   cout << "Enter a month(numeric form)"<< endl;

   cin >> mt;

   cout << "please enter a day"<<endl;

   cin >> day;

   cout << "please enter a year"<< endl;

   cin >> yr;

   // Input Validation

   if (mt<1 || mt>12){

       cout<<"Invalid Month";

   }

   else if (day<1||day>31){

       cout<<"Invalid Day";

   }

   else if (yr>99||yr<0){

       cout<<"Invalid Year";

   }

   else{

   // Calculates magic

   magic = (mt * day);

   if (magic == yr)

   {

   cout << "it is a magic year"<<endl;;

   }

   else

   cout << "It is not a magic year" << endl;

   }

   return 0;

}

Explanation:

Using C++ we request the user to enter values for Month, day and year (two digits). We carry out input validation to ensure the user enters a valid month, day and year. Using if/elseif/if statements we ensure the conditions given in the question.

7 0
3 years ago
testout You want to prevent users in your domain from running a common game on their machines. This application does not have a
Margarita [4]

Answer:

Hash condition is the correct answer to the following question.

Explanation:

Hash condition provided more security than the applocker file path rule and it is manually for the files.

  • It is more secure than the path rule because each file has its separated hash condition.
  • Drawback of hash file is every time whenever when file is updated then we have to update the file hash condition.
8 0
3 years ago
Other questions:
  • A(n) ____ tag is used to let the compiler know that your intention is to override a method in a parent class
    10·1 answer
  • Line spacing refers to the amount of space between each line in a paragraph. A. True B. False
    14·2 answers
  • Thsi is for gacha girl5467
    14·2 answers
  • Looking for friends, anyone up for it?
    12·2 answers
  • D. DROP
    6·1 answer
  • Write a Scientific report modeling a written reasearch paper on big data applications.​
    6·1 answer
  • Assume that you have the business data in various sources such as Excel, .csv, text files and Access, Oracle databases. Write th
    9·1 answer
  • How many basic elements of QBASIC are there
    14·1 answer
  • Why isn't image display working on wacom tablet.
    8·1 answer
  • List 2 advantages Cryptocurrency have over regular bank transactions
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!