1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Harlamova29_29 [7]
3 years ago
14

Who is the best nfl team in your mind

Computers and Technology
2 answers:
emmainna [20.7K]3 years ago
8 0

Answer: Green Bay Packers

Explanation:

MA_775_DIABLO [31]3 years ago
5 0

Answer:

Los Angeles Ram

Explanation:

They going to take the Super Bowl this year they're a hard team ro beat they got a lot of pride and heart into there team!

You might be interested in
Visit on social networking site and look for the site's privacy policy.The link is typically found at the bottom of the page and
Mekhanik [1.2K]

Answer:

Explanation:

Your profile. Most social networks allow users to create detailed online profiles and connect with other users in some way. This may involve users sharing information with other users, such as one’s gender, age, familial information, interests, educational background and employment.

Your status. Most social networks also allow users to post status updates in order to communicate with other users quickly. Though there may be privacy settings to restrict access to status updates, these networks are frequently designed to broadcast information quickly and publicly.

Your location.  Many social networks are designed to broadcast your real-time location, either as public information or as an update viewable to authorized contacts. This might allow users to “check in” to a local event or business, or share one’s location with contacts within their network.

Shared content. Many social networks encourage users to share content, such as music, photographs, videos and links to other webpages.

4 0
3 years ago
Im learning about AI in my class and I'm confused about these two questions
DENIUS [597]

Answer:

i aint looking at random pictures bro, i dont know what might be on them

Explanation: ok

6 0
3 years ago
Read 2 more answers
Wireless attacks avoid the access points to limit detection. <br> a. True <br> b. False
-BARSIC- [3]

Answer:

Option B i.e., False.

Explanation:

The weakness, KRACK tricks a wifi access points to reuse an in-use encryption, enabling the intruder to decode and interpret data intended to remain encrypted. Wireless communication encrypts, that decrypt unencrypted wireless network activity and expose sensitive data.

So, the following scenario is false about the wireless attack.

6 0
3 years ago
Discuss how a lack of infrastructure in poor communities could contribute to ill-health such as the Unrest looting.​
shutvik [7]

Answer:No service from hospital for injured people

Explanation:

Yes of course

4 0
2 years ago
Christina has been asked by the firewall administration group to identify secure network protocols that can be used to prevent n
kotegsom [21]

Answer:

SSH, HTTPS and SMTP

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Hence, SSH, HTTPS and SMTP are considered as secure network protocols.

HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL).

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

6 0
3 years ago
Other questions:
  • Being tired has very similar effects on the body as what
    7·1 answer
  • You put $500 in an interest bearing bank account that pays 2% per year but has a fee of $2 per month. Are you getting ahead?
    14·2 answers
  • A __________ network is good for connecting computers over boundaries.
    6·2 answers
  • A form of speech that is used to clarify, describe, demonstrate, and/or explain is referred to as _____.
    7·2 answers
  • To prepare a data character for transmission, a ____ bit is added to the beginning of the character and informs the receiver tha
    11·1 answer
  • All of the following are advantages of database-stored information, except ______________. Multiple Choice
    7·1 answer
  • __________ is a growing practice in cooperative farmingassociations to pool and sell the fruit as a common commodity underthe br
    6·1 answer
  • What is normalization?
    7·1 answer
  • Which directory stores the cron configuration file?.
    8·1 answer
  • Which option is an example of an algorithm that is used in daily life?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!