1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleks04 [339]
3 years ago
12

A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under whic

h situation would a wireless connection be recommended?.
Computers and Technology
1 answer:
Ganezh [65]3 years ago
7 0

Wireless connectivity is recommended for use with laptops or mobile devices, especially as newer devices are less likely to have ethernet connectivity built in. In either case, use of wireless technology make it easier for users to move around without having to worry about being plugged in. Wired connections are still recommended for anything that doesn't need to be able to move as it is generally more reliable, and depending on the devices involved, could offer a faster connection.

You might be interested in
Distinguish<br> between formal and Informal<br> Information System<br> Information systems
Harlamova29_29 [7]

Explanation:

Formal; A formal information system is based on

the organization represented by the organization chart.

Informal; The informal information system is

employee based system designed

to meet personal and vocational needs

and to help in solution of work-related problems.

5 0
3 years ago
What is filter in image processing
Alla [95]

Answer:

Image processing operations implemented with filtering include smoothing, sharpening, and edge enhancement.

4 0
3 years ago
Consider the following list.list = {24, 20, 10, 75, 70, 18, 60, 35}Suppose that list is sorted using the selection sort algorith
DochEvi [55]

Answer:

list = {10, 18, 24, 75, 70, 20, 60, 35}

Explanation:

In selection sort 1st element of array is compared with all elements in list. If there is any element smaller than any other element in the list,  that will be swap with first element as

1st iteration:

in given list first element is 24, this will compare with whole list and find the number that is smaller than any other element in list. there 10 is smallest element in the list so in first iteration the list is given as:

list = {10 , 20, 24, 75, 70, 18, 60 ,35}

2nd Iteration:

After first iteration the smallest element of list will comes at first position. Now we start with 2nd position of list. 2nd element of the list will be compared with all other elements except 1st element. The 2nd smallest element of the list will be replaced with 2nd element of array.

In 2nd iteration, 18 is 2nd smallest element in the list so that will be swap with 2nd element of list. now the list is given as after

list = {10, 18, 24, 75, 70, 20, 60, 35}

5 0
4 years ago
Jasmine is writing a shopping app. She has created a variable to keep track of the number of items in the shopping cart. Every t
Bas_tet [7]

Answer:

C.     carTotal=carTotal + 1;

Explanation:

Option 'c' is the correct answer, because when some click on the "additembutton" the variable cartTotal should increment by 1. As jasmine want to track the record of no. of items in cart, each time customer will click "additembutton" the variable "cartTotal" increment by 1 and also update the value of that variable. e.g

If initially

cartTotal=0

When 1st time additembutton pressed

CartTotal = CartTotal + 1   ==> will make it as   CartTotal=0+1    ==>  CartTotal = 1

Now CartTotal=1;

When customer 2nd time press "additembutton"

CartTotal = CartTotal + 1   ==> will make it as   CartTotal=1+1    ==> CartTotal = 2

This process will continue and update the cartTotal till the customer add items into the cart.

8 0
3 years ago
The principal object of a hash function is __________ .
abruzzese [7]

Answer:

a. data integrity

Explanation:

In Computer science, a hash function can be defined as any function which is used to map data by accepting a block of data with variable length size or arbitrary size as input to produce a fixed size hash values or codes.

Generally, when a block of data (input) of arbitrary size is hashed, the resulting hash values or codes is usually smaller than the input data. Thus, hash functions are considered to be a compression of data and as a result, sometimes called compression functions. Basically, the block size of a hash function typically ranges from 128 bits to 512 bits.

Some of the properties of a hash function are;

1. <em><u>Pre-image resistance</u></em>: this makes it practically impossible to reverse a fixed-size hash values to its initial arbitrary size. This property helps to maintain and enhance data integrity by making it difficult or impossible for an attacker to find the input data from a hash value.

2. <em><u>Second pre-image resistance</u></em>: this property makes it near impossible or very difficult to determine or decode another input data from a given set of input and hash values. Also, this helps to enhance data integrity.

3. <em><u>Collision resistance</u></em>: this is to make possible for all hash values to have a unique value. This simply means that, with this property it would be difficult for different input data to have the same hash value. Thus, it helps to create integrity in data management.

<em>Hence, with the aforementioned properties, the principal object of a hash function is data integrity.</em>

Hash functions in the computer world includes;

1. Message Digest (MD): it is a 128 bit hash function and comprises of the following; MD2, MD4, MD5, and MD6.

2. Secure Hash Function (SHA): it comprises of the following; SHA-0, SHA-1,SHA-2, and SHA-3.

3. Whirlpool: it comprises of the following; Whirlpool-0, Whirlpool-T, and Whirlpool. It is primarily a 512 bit hash function.

4. RACE Integrity Primitives Evaluation Message Digest (RIPEMD): it comprises of the following versions; RIPEMD, RIPEMD-128, and RIPEMD-160.

8 0
3 years ago
Other questions:
  • Which of the following best describes the purpose of child labor laws?
    13·2 answers
  • A collection of related instructions organized for a common purpose is referred to as
    6·2 answers
  • What Linux services can pose a problem when attempting to reach remote host on a network?
    5·2 answers
  • I’m trying to get answers from Brainly and it’s not showing up. I’ve been refreshing the browser, but it’s the same. I’ve never
    10·2 answers
  • This needs to be written in Java.
    11·1 answer
  • Which amendment to the Constitution ended slavery in the United States?
    8·1 answer
  • PLZ help
    5·1 answer
  • Subscribe too my you tube channel for a brainiest
    15·1 answer
  • Capstone Project part 11 quiz
    6·1 answer
  • How do I add a Child to my Brainly account
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!