1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rufina [12.5K]
2 years ago
15

What is the minimum number of bits you would need to represent a number on a 0 to 10 scale

Computers and Technology
1 answer:
Oxana [17]2 years ago
4 0
What do you mean I don't understand
You might be interested in
Is the wireless network you own as secure as it should be? Examine your wireless network or that of a friend or neighbor and det
AleksandrR [38]

Answer:

See explaination

Explanation:

Wireless Security:

In a bid to examine the network you can use ipconfig /all command in windows or in the event where you are a linux user type in ifconfig to view all the configuration details of your network such as

indows IP Configuration

Host Name . . . . . . . . . . . . : myvpc-hb

Primary Dns Suffix . . . . . . . : example.com

Node Type . . . . . . . . . . . . : Hybrid

IP Routing Enabled. . . . . . . : Yes

Ethernet adapter Local Area Connection:- - - - - -

Connection-specific DNS Suffix . :- - - - - -

Description . . . . . . . . . . : Intel 68540-Based PCI Express Fast Ethernet Adapter

Physical Address. . . . . . . . . : 00-03-AA-BC-CA-8F

Autoconfiguration Enabled . . . . : Yes

Link-local IPv6 Address . . . . . : fe65::ab56:ccb9:320c:524d%8(Preferred)

IPv4 Address. . . . . . . . . . . : 192.168.45.111(Preferred)

Default Gateway . . . . . . . . . : 192.168.15.1

DHCP Server . . . . . . . . . . . : 192.168.15.1

DHCPv6 IAID . . . . . . . . . . . : 201327615

Note: If you want to deeply examine the your network and to find security model go with Wireshark application.It will help you to capture the data packets easily using GUI.Also it will provide other details like transmission control protocols,etc.

To take your network to highest level i.e. to make it more secure you can use:

1.Firewalls like application gateways,packet filtering,hybrid systems.

2.Crypto cable routers

3.Virtual private networks, etc.

Estimation of cost and the time to increase the level is solely depends on the type of the architecture you want to use for the network building structure.Also the size of the network will be responsible for the cost and time.

In case of any attack on your computer it depends on the size of the data on the computer disc and the bandwidth of the network to which your computer is connected to replace all data. The faster the bandwidth of the network,faster the data replacement rate.

3 0
3 years ago
In python, sorry if it’s blurry
stepan [7]

Answer:

nice

Explanation:

3 0
2 years ago
Read 2 more answers
Write a program to play an automated game of Rock, Paper, Scissors. Two players make one of three hand signals at the same time.
zhuklara [117]

Answer:https://www.chegg.com/homework-help/questions-and-answers/program-specifications-write-program-play-automated-game-rock-paper-scissors-two-players-m-q84530098

3 0
2 years ago
Create a cell reference in a formula by typing in the cell name or
il63 [147K]

Answer:

D. Clicking the cell

Explanation:

Clicking the target cell is an alternative way of typing in the cell name when creating a cell reference in a formula.

Hope this helps!

8 0
3 years ago
Read 2 more answers
________ are small files that browsers store on users' computers when they visit web sites.
Mila [183]
Downloads? It sounds like that might be the answer. Idk.
4 0
3 years ago
Other questions:
  • Due largely to the prevalence of reading them on screens rather than in​ print, the body text of most contemporary documents now
    8·1 answer
  • What are some options available when using the Replace feature?
    13·1 answer
  • A server would experience a __________ attack when a hacker compromises it to acquire information from it from a remote location
    13·1 answer
  • I have a problem with Instagram.
    11·1 answer
  • Give an example of a situation in which a compromise of Confidentiality leads to compromise in Integrity.Situation where confide
    8·1 answer
  • An algorithm is:
    14·1 answer
  • 2. Discuss CORBA functions<br><br>​
    6·2 answers
  • Data type can only be true or false <br><br> Answer: Bool
    15·1 answer
  • I need help pls help me
    8·1 answer
  • You use lpstat and determine that a user named User1 has placed two large print jobs in the queue for Printer1 that have yet to
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!