1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jok3333 [9.3K]
3 years ago
9

A.Distance sensor b.Programable microcontroller c.Ambient light sensor d.Wi-Fi

Computers and Technology
2 answers:
vagabundo [1.1K]3 years ago
4 0

Answer:

.Wi-Fi

Explanation:

Wi-Fi is the wireless technology used to connect computers, tablets, smartphones and other devices to the internet. ... The device transmits a radio signal back to the router, which connects to the internet by wire or cable.

Rainbow [258]3 years ago
3 0

D WiFi

It uses wifi to connect to the internet

You might be interested in
With ____ editing, Word automatically displays a Paste Options button near the pasted or moved text.
harina [27]
The answer is drag and drop. 
 With drag and drop editing, word automatically displays a paste option button near the pasted or moved text. 
8 0
3 years ago
HTML is the authoring language developed to create web pages and define structure and layout of a web document
Eduardwww [97]

Answer:

true

Explanation:

7 0
3 years ago
Read 2 more answers
When using a calculator be sure to press ____ first.​
matrenka [14]

Answer:

A. C to clear any previous calculations.

hope it helps...

6 0
3 years ago
Read 2 more answers
Read "Penetration Testing – Reconnaissance with NMAP Tool," located within the required readings. In the article, the authors di
steposvetlana [31]

Answer:

Check the explanation

Explanation:

The two tools that are utilized for consideration in cyber attacks are operating systems and computer systems. The operating system Kali Linux 2.6 3.x Mix (64-bi) and windows XP SPO (32-bit).

Penetration testing is a very important technique or procedure in auditing the loopholes and security in a particular operating system. The computer systems are Nmap and VMware. The author posit that VMware is a virtual machines programming that gives a virtual PC the capacity for more than one event or action of the working frameworks to keep cunning one similar server.

Nmap (“Network Mapper”) according to the authors, it is a free and open source utility for system reviewing and security. these tools are used for the purpose of finding an open port and to also gain access while another considers the vulnerabilities of the operating system.

ALL together these tools assist in building the foundation for ethical hacking. Using Nmap allows a hacker to gain access to the system thereby seeing all the flaws to actively peruse that account. All these tools work together for a successful hacking process and procedures.

5 0
3 years ago
What does the Communications Decency Act of 1996 provide?
Softa [21]

Answer:

a

Explanation:

its the correct becayse

3 0
3 years ago
Other questions:
  • To keep your emails concise and to the point
    13·1 answer
  • How can a user preview the playback of an audio clip in PowerPoint? Use the drop-down menus to complete the statements.
    14·1 answer
  • Which is a copyright
    13·2 answers
  • What was a result of george washington's belief in the sovereignty of the people instead of monarchy?
    9·1 answer
  • One of the most common encryption protocols in use today. It is an asymmetric protocol that enables the sharing of a secret key
    7·1 answer
  • Which shape is used for input or output?
    15·1 answer
  • Help me decide this hurry
    12·1 answer
  • A town decides to publicize data it has collected about electricity usage around the city. The data is freely available for all
    9·1 answer
  • Write a Python program that prints all the numbers from 0 to 6 except 3
    8·1 answer
  • Please help with question
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!