1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elena L [17]
3 years ago
6

How can i see what websites are visited on my wifi

Computers and Technology
1 answer:
grigory [225]3 years ago
5 0

Answer:

If you want to view sites visited on a wireless network, you can check the logs stored by the wireless router to see what information is available. You may need to set your logging settings to capture the data you want.

Explanation:

You might be interested in
Assume that the demand curve for DVD players shifts to the left and the supply curve for DVD players shifts to the right, but th
kari74 [83]

Answer:

a.both the equilibrium price and quantity of DVD players will decrease

Explanation:

When the amount required or given varies, even if the price stays the same, a move in the demand or supply curve occurs. Changes in the curve of demand mean that the initial relationship of production has shifted so that demand of quantity has a factor apart from cost influenced

A right shift change of the supply curve shows an increase in supply and, on equal footing, the equilibrium price decreases.

Once the demand curve shifts to the left, the demand decreases.

7 0
3 years ago
Computer security:
Monica [59]

Answer:

A) Direct

Explanation:

if u want to be very specific on what u need to get into then u need to be direct on what u are getting into.

7 0
3 years ago
Write a program that asks for a password and then verifies that it meets the stated criteria. • If the password meets the criter
inessss [21]

Missing Details in Question

The password criteria are not stated. For this program, I'll assume the following

  • Password must contain at least 1 capital letter
  • Password must contain at least 1 small letter
  • Password must contain at least 1 digit
  • Password must be at least 8 characters

See Attachment for Source File "MyName-Hwrk10A.cpp"

Answer:

// Comment explains difficult lines

#include<iostream>

#include<cstring>

#include<cctype>

using namespace std;

int main()

{

//Enter your name here

int k,l,m;

/*

Integer variables k,l and m are used to count the number of  

capital letters small letters and digits in the input string (password)

*/

//Initialize them to 0

k=0;l=0;m=0;

int length;

string pass;

cout<<"Password: ";

cin>>pass;

//Calculate length of input string

length = pass.length();

//The following variable is declared to determine if the input string meets criteria

int det = 0;

for(int i = 0;i<pass.length();i++)

{

 if(isupper(pass[i])){ k++;}

 if(islower(pass[i])){ l++;}

 if(isdigit(pass[i])){ m++;}    

}

if(k==0)

{

cout<<"Password doesn't contain capital letters "<<endl;

det++;

}

if(l==0)

{

cout<<"Password doesn't contain small letters "<<endl;

det++;

}

if(m==0)

{

cout<<"Password doesn't contain digit "<<endl;

det++;

}

if(length<8)

{

cout<<"Length of password is less than 8 "<<endl;

det++;

}

if(det == 0)

{

 cout<<"Password meets requirements "<<endl;

}    

 return 0;

}

Download cpp
4 0
3 years ago
Print ___________ command is used for adding numbers.​
quester [9]

Answer:

phyton is the answer....

5 0
3 years ago
Question 8 of 10
Feliz [49]

Answer: B. Multi-user, multitasking.

Explanation:

Multiuser/Multitasking operating system refers to an operating system that's powerful and supports more than one user at a time, and can also perform more than one task at a time.

The operating system allows many users to use the programs which are running concurrently on a single network server. It is the computer operating system that would be best for a large corporation. An example is UNIX.

4 0
3 years ago
Other questions:
  • 1. Which of the following are considered CAD powerhouses?
    6·1 answer
  • The Active Directory Users and Computers tool can be used to:______.
    11·1 answer
  • In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server
    6·1 answer
  • What is the syntax of an of if statement
    13·1 answer
  • All file types have unique _____________________ that determine which program to use to open a particular file and to access its
    14·1 answer
  • In PKI, the CA periodically distributes a(n) _________ to all users that identifies all revoked certificates.
    13·1 answer
  • What are the different steps while solving a problem using computer? explain​
    7·1 answer
  • Factoring is the revers of​
    14·1 answer
  • Need help ASAP.<br> I am so lost.
    5·1 answer
  • What are different sheet icons
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!